SlideShare uma empresa Scribd logo
1 de 34
Embracing secure, scalable BYOD
with Sencha and Centrify
Presented by:
Contents
- Technology Trends and Challenges
- App Development and Data Security
- Managing Identity Sprawl
- Integration
2
Technology Trends And Challenges
3
Technology Trends
Shaping the Evolution of Enterprise Mobility
Consumerization of IT
Rapid Adoption of Mobile
Enterprise Cloud Goes
Mainstream
Accelerating workforce
virtualization
• Personal devices becoming pervasive in the
enterprise
• Organizations must address challenges around
BYOD
• Opportunity for productivity gains and cost savings
• Mobile device sales surpass PC sales
• Mobility comes with heightened security risks
• Driving a shift to mobile-first development
• Cloud services gain acceptance for use in
production
• Cloud providers adapt offerings for the enterprise
• Cloud IT investment poised for explosive growth
• Collaboration with non-employees is the new
normal
• Managing access and data security is a major
challenge
• Organizational boundaries increasingly dynamic
4
Brave new world… but
IT management is losing control and visibility
with increased:
• Reliance on user-managed passwords
• Adoption of SaaS and mobile apps
• Proliferation of remote and untrusted devices
IT needs a new model
… that secures all devices…
…solves the password problem…
… and regains access control and
visibility
Users have lots more choices
and use many more apps
Users, apps and devices are
no longer “behind the firewall”
Mobile is the new, preferred way
to access apps
• End-users have too many
passwords
• Passwords are inherently
weak
• Many SaaS apps have a rich
mobile client
• Users have increasing
numbers of devices
accessing those apps
5
A few facts…
• 75% of security breaches involve compromised credentials
• 71% targeted user devices
• 58% perpetrated by insiders (takes 32 months to detect)
• 13% leveraged misuse of privilege
• Average cost $188 per record
CIO: Testifying Before
the Senate
56.95
57.95
58.95
59.95
60.95
61.95
62.95
63.95
64.95
65.95
0 1 2 3
$pershare
Months After Breach
$5.37 Billion in
shareholder value
lost
Breach disclosed
in media
6
What IT cares about
1. Enable employee
productivity
2. Ensure compliance
requirements are
addressed
3. Efficient management
7
1. Optimize efficiency of their
developer teams
2. Deliver apps that meet
business and end-user
requirements
3. Maximize the useful
lifetime of the app
What App Dev
Managers care about
Aligning Objectives
App Development And Data
Security
8
The cost of mobility can erode its ROI
Inefficient mobility
and security wastes resources
Write Code Test Publish to
app market
Deploy Update
$ $ $ $ $
Each part of the app
development process
incurs expenses…
Write Code Test
Publish to
AppStore
Deploy Update
$ $ $ $ $
Write Code Test Publish to
app market
Deploy Update
$ $ $ $ $
…which multiply with
each new supported
mobile OS/device
platform
Management Security
And these processes and apps
need to be managed and
secure to limit risk
Challenges
The security landscape has raised the stakes
Security is increasingly challenging
 Targeted attacks
 Spear phishing and social engineering
 Mobile malware
 Advanced Persistent Threats
 Rising cost of data breaches
How do you manage the tradeoffs between
 Operational flexibility
 Security
 Cost and complexity
 End-user experience
$
End-to-End Data Security
• Data security means protecting confidentiality and integrity of data
• Management and enforcement across three modes of data use
1. At-rest – When data is stored on a device
2. In-motion – When data is traversing the network
3. In-use – When a user interacts with the data through an app on a
device
• Ensuring data security as data moves across the range of
untrustworthy networks and devices is not trivial
Overview
Managing Identity Sprawl
12
12
From: The Rise of Data-Driven Security, EMA Research Report, 2012
© 2012 Enterprise Management Associates, Inc.
The Impact of Fragmented Identity
• The ideal can be hard to
achieve when identity is
scattered among
• Applications
• Systems
• Endpoints
• Mobile devices
• Third party apps
• Networks
• On premises
• SaaS, Cloud
• Etc. …
Poor integration among security tools
Too difficult to distinguish which security
actions or policies are working and which are
ineffective or unnecessary
Most significant frustrations with IT
security technologies? Top 2 responses:
13
Multiple identities + Password Sprawl
Create risk
• Multiple logins for users
• Multiple identity infrastructures for IT to manage
In-
house
Apps
and
100’s
more….Laptops
Smartphones and Tablets
ID
ID
ID
ID
ID
ID
ID
ID
ID
ID
14
Federated Identity
Where users have one login ID and password
And IT has one Federated Identity Infrastructure to manage
End Users
Laptops
Smartphones and Tablets
ID
15
Strengthen Security with Federated Identity
• Federated Identity ensures
that users only need to use
their AD userid/password
– Only one password to
remember
– Password is protected by the
Enterprise in AD
• AD-based federation provides
several advantages for IT
– Leverages existing account
and password policies –
simplifying management
– Ensures that IT controls
access
eliminating risk of orphaned
accounts
Federation
Trust
Cloud
Proxy Server
IDP as a Service
Firewall
ID
ID
16
Integrated Solution
Easily Manage Apps, Data, And
Users
17
Sencha Space
Benefits
 Streamline app development
process –Eliminate
PhoneGap/Cordova
 Deliver HTML5 apps directly to
end-users through a
managed, secure runtime
platform
Easily mobilize existing web and HTML5 apps
 Helps protect your apps and data by
 Managing user access
 Remotely wiping your data from devices as
needed
 Keeping your business data separate from
other data on the device
 Leverage developer APIs for a rich
application experience
Sencha Space
• Management Overvie Management Console
• Provides centralized management of the
user, data, and application lifecycles
• Allows administrators to enforce policy
consistently
• Set minimum PIN length
• Specify group membership
• Provision apps to groups
• Configure advanced user authentication
• Enable SSL VPN connectivity
• Facilitates reporting and auditing with detailed
usage analytics
Space Management
Centralized Admin Console
Policy Engine
Identity and
Access
App Delivery
Data Security
Network
Security
•Supports iOS and Android (Win Phone 8
and Blackberry in beta)
•Segregates business and personal data
•Secures business data with strong
encryption and digital signatures
•Enforces policies downloaded from the
console
•Facilitates secure, managed use of
HTML5 apps
•Provides developer API to OS/Device
features for rich, modern, mobile user
experience
Mobile Client Application
Sencha Space
Client Overview
Sencha Space
Security
•Data Encryption – All data is stored
encrypted in Space to protect the
confidentiality of sensitive, proprietary
information
•Network Security – All data transmitted
between the Space client app and
management server is SSL-encrypted
•VPN Support – Integration with Cisco
and Juniper clientless SSL VPN for
secure connectivity between the Space
client app and back-end data center
assets
•Authentication – Single sign-on
support using widely accepted SAML
open standard
Security
Key Benefits
• Reduce the risk of
data breach
• Grant access to
applications and data
based only on
business need
• Deploy applications
securely to anyone on
any device
Sencha Space
Overview of Capabilities and Benefits
Component Capabilities Benefits
Security • Secure data in-motion and at-rest
• Manage user access entitlements
• Manage risk
• Facilitate compliance
Policy Engine • Set and enforce consistent usage and security
policies
• Deploy applications instantly
• Block users/devices instantly
• Improve operational
efficiency
• Manage mobility risk
Analytics • Monitor activity at the user and device level
• Track application activity
• Facilitate audit and reporting
• Enhance operational visibility
Developer API • Provide consistent API access to native device/OS
capabilities
• Provide developer access to Space platform
capabilities
• Help reduce the cost of
cross-platform development
Centrify Cloud Services
= Unified Identity Services
+
Centrify Cloud Services
Centrify Software
• Authentication / Single Sign-On (SSO)
• Auditing and reporting
• Self-service portal
• Mobile application management
• Encryption of data-in-motion
• Policy Enforcement
• Authorization and role-based access control
• Mobile Zero Sign-on (ZSO)
• Mobile device management
• etc.
23
Centrify Cloud Service
Centrify for
iOS
Centrify for
Android
Centrify Cloud
Proxy Server
Centrify DirectManage Framework
DirectManage
ADUC Extension
DirectManage
Group
Policy Extension
Microsoft
Certificate
Authority
Firewall
Centrify for
Mac
Active Directory-based Security Infrastructure
Centrify Cloud
Manager
Centrify for
SaaS
Centrify Cloud Services
24
Centrify Cloud
Proxy Server
Centrify Cloud Service
Centrify for
SaaS
Centrify Cloud
Manager
Firewall
Centrify for SaaS
• One click SaaS SSO
leveraging Active Directory
credentials
• SSO Integration with SaaS
via
SAML, HTTP, proprietary
API, OAuth, Open ID
connect
• User self-service for mobile
devices (e.g.
location, wipe, lock)
• User self-service for AD
account
(e.g. edit attributes, reset
password)
• Common administration
tools for mobile and SaaS
applications
SaaS Apps
SaaS and Mobile
App Catalog
You Are Here
ISV Onboard
Centrify Cloud Services
Microsoft
Certificate
Authority
Active Directory-based Security Infrastructure
25
Centrify Cloud
Proxy Server
Centrify Cloud Service
Microsoft
Certificate
Authority
Centrify Cloud
Manager
Firewall
SaaS Apps
Mobile
App
Centrify for
iOS and
Android
Active Directory-based Security Infrastructure
Centrify for Mobile Applications
• Device is authenticated and joined to
Active Directory
• Enables silent authentication aka
Zero Sign-On (ZSO) for mobile apps
via simple integration with
Centrify Mobile Authentication SDK
• Mobile apps interacts with Centrify
cloud services for authn and authz
• Mobile app can also access
information about user attributes in
AD
• App settings can be centrally
managed based on AD Group Policy
• Remote wipe of Mobile App & Data
• Common administration tools for
mobile and SaaS applications
SaaS and Mobile
App Catalog
You Are Here
ISV Onboard
Centrify Cloud Services
26
Centrify Simplifies SaaS/Mobile Federated Auth
Integrate Mobile App
Authentication
provides true
enterprise Zero Sign-
On
• Mobile app
authenticates and
registers AD as it’s
identity provider
• Mobile app can
access information
about user attributes
in AD
• Mobile app gains SSO
to backend services
Cloud
Proxy Server
IDP as a Service
Firewall
Mobile OS
Mobile App
Mobile Auth
SDKMDM
Step 2
One time user authentication
& device registration
Step 1
Web
Application
Registration
Step 4
Token based
Authentication
Step 3
Token Generation
Hosted
Application
ID
27
Extend Identity Services to Mobile Platforms
Mobilize app and service access
– Enable mobile access to Enterprise services and applications
– Design mobile interfaces to seamlessly integrate with the
Enterprise services
Containerization to separate work from personal
– Protect work applications and data from data leakage
– Provide the laptop experience on mobile, unlock and access
all business apps
Centralize mobile and application administration
– Enabling IT to manage security policies for
Mobile, Workstations and Servers
– Unifying app management into one interface for Mobile, Web
and SaaS Apps
– Leveraging automated lifecycle management through AD
28
Integrated Solution
How Sencha And Centrify
Technology Can Help
29
Cloud
Proxy Server
Firewall
Hosted Application aka
Sencha Space Cloud Service
Step 1
Web
Application
Registration
Step 3
Token based
Authentication
Step 2
Token Generation
ID
Centrify IDP as a
Service
Centrify + Sencha for Cloud SaaS Apps
Mobile OS
Sencha Space App
Auth
Client
30
Integrated Solution
Demo Of SAAS Application
31
Cloud
Proxy Server
Firewall
Internal Application
Step 3
Token based
Authentication
Step 2
Token Generation
ID
Centrify + Sencha for Internal SaaS Apps
Step 1
Web Application
Registration
Mobile OS
Sencha Space App
Auth
Client
Centrify IDP as a Service
32
Integrated Solution
Demo Of Internal Application
33
Resources
Centrify
• Centrify IDaaS, MDM and MAM:
https://www.centrify.com/cloud/clo
ud-service-registration.asp
• Centrify Developers:
http://developers.centrify.com
• Questions:
sumana.annam@centrify.com
• Twitter: @centrify, @annamsr
Sencha
• Sencha Space
http://www.sencha.com/space
• Get started with a free trial in less
than 5 minutes!
https://manage.space.sencha.com
• Questions:
space-feedback@sencha.com
• Twitter: @sencha, @nharlow
34

Mais conteúdo relacionado

Mais procurados

Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)Ivanti
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...7Summits
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti
 
What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 Ivanti
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld
 
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...Internet World
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service DeskIvanti
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...CA Technologies
 
Jan19 scim webinar-04
Jan19 scim webinar-04Jan19 scim webinar-04
Jan19 scim webinar-04Paul Madsen
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Kelly Grizzle
 
ServiceNow Portfolio
ServiceNow PortfolioServiceNow Portfolio
ServiceNow PortfolioChris Dauw
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 

Mais procurados (20)

Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.Ivanti Identity Director 2020.1.
Ivanti Identity Director 2020.1.
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
Ivanti May 2020 Patch Tuesday
Ivanti May 2020 Patch TuesdayIvanti May 2020 Patch Tuesday
Ivanti May 2020 Patch Tuesday
 
What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0 What's New in Ivanti Workspace Control 2020.0
What's New in Ivanti Workspace Control 2020.0
 
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
VMworld 2013: VMware Compliance Reference Architecture Framework: Accelerate ...
 
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
How Kelway Evolved Its Managed Services Practice with CA Unified Infrastructu...
 
Jan19 scim webinar-04
Jan19 scim webinar-04Jan19 scim webinar-04
Jan19 scim webinar-04
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
ServiceNow Portfolio
ServiceNow PortfolioServiceNow Portfolio
ServiceNow Portfolio
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 

Destaque

Do-It-Yourself vs. Off-The-Shelf
Do-It-Yourself vs. Off-The-ShelfDo-It-Yourself vs. Off-The-Shelf
Do-It-Yourself vs. Off-The-ShelfApttus
 
Ensighten for waw houston 20150326
Ensighten for waw houston 20150326Ensighten for waw houston 20150326
Ensighten for waw houston 20150326Kashif Khurshid
 
Lithium-ion Capacitor (LIC)
 Lithium-ion Capacitor (LIC) Lithium-ion Capacitor (LIC)
Lithium-ion Capacitor (LIC)Seminar Links
 
Private Equity Tax Planning in 2010
Private Equity Tax Planning in 2010Private Equity Tax Planning in 2010
Private Equity Tax Planning in 2010BDO
 
Using luxembourg in international structures
Using luxembourg in international structuresUsing luxembourg in international structures
Using luxembourg in international structuresBDO Ukraine LLC
 
Due Diligence Best Practices and Pitfalls
Due Diligence Best Practices and PitfallsDue Diligence Best Practices and Pitfalls
Due Diligence Best Practices and PitfallsFirmex
 
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )Dez Blanchfield
 
The Homecare Intelligence (HCI) Solution - Providers
The Homecare Intelligence (HCI) Solution - ProvidersThe Homecare Intelligence (HCI) Solution - Providers
The Homecare Intelligence (HCI) Solution - ProvidersIris Fung
 
Company which only knows deploying Wireless Networks & secured WIFI in India
Company which only knows deploying  Wireless Networks & secured WIFI in IndiaCompany which only knows deploying  Wireless Networks & secured WIFI in India
Company which only knows deploying Wireless Networks & secured WIFI in IndiaPpawan Chauhan
 
缶詰屋さんの課題解決にスクラムを使ってみた
缶詰屋さんの課題解決にスクラムを使ってみた缶詰屋さんの課題解決にスクラムを使ってみた
缶詰屋さんの課題解決にスクラムを使ってみたToshiyuki Ohtomo
 
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BI
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BIHot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BI
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BIDez Blanchfield
 

Destaque (14)

Do-It-Yourself vs. Off-The-Shelf
Do-It-Yourself vs. Off-The-ShelfDo-It-Yourself vs. Off-The-Shelf
Do-It-Yourself vs. Off-The-Shelf
 
Ensighten for waw houston 20150326
Ensighten for waw houston 20150326Ensighten for waw houston 20150326
Ensighten for waw houston 20150326
 
Lithium-ion Capacitor (LIC)
 Lithium-ion Capacitor (LIC) Lithium-ion Capacitor (LIC)
Lithium-ion Capacitor (LIC)
 
Private Equity Tax Planning in 2010
Private Equity Tax Planning in 2010Private Equity Tax Planning in 2010
Private Equity Tax Planning in 2010
 
Using luxembourg in international structures
Using luxembourg in international structuresUsing luxembourg in international structures
Using luxembourg in international structures
 
Nikola Tesla
Nikola TeslaNikola Tesla
Nikola Tesla
 
Fullforce Initiative
Fullforce Initiative Fullforce Initiative
Fullforce Initiative
 
Due Diligence Best Practices and Pitfalls
Due Diligence Best Practices and PitfallsDue Diligence Best Practices and Pitfalls
Due Diligence Best Practices and Pitfalls
 
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )
Big Data @ CeBIT 2015 - Dez Blanchfield ( Day #1 )
 
40 Ways We Love Our Clients
40 Ways We Love Our Clients40 Ways We Love Our Clients
40 Ways We Love Our Clients
 
The Homecare Intelligence (HCI) Solution - Providers
The Homecare Intelligence (HCI) Solution - ProvidersThe Homecare Intelligence (HCI) Solution - Providers
The Homecare Intelligence (HCI) Solution - Providers
 
Company which only knows deploying Wireless Networks & secured WIFI in India
Company which only knows deploying  Wireless Networks & secured WIFI in IndiaCompany which only knows deploying  Wireless Networks & secured WIFI in India
Company which only knows deploying Wireless Networks & secured WIFI in India
 
缶詰屋さんの課題解決にスクラムを使ってみた
缶詰屋さんの課題解決にスクラムを使ってみた缶詰屋さんの課題解決にスクラムを使ってみた
缶詰屋さんの課題解決にスクラムを使ってみた
 
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BI
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BIHot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BI
Hot tech 20161221 - ep0022 - IDERA - an ounce of prevention - Forging Healthy BI
 

Semelhante a Embracing secure, scalable BYOD with Sencha and Centrify

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space미래웹기술연구소 (MIRAE WEB)
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 

Semelhante a Embracing secure, scalable BYOD with Sencha and Centrify (20)

Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Embracing secure, scalable BYOD with Sencha and Centrify

  • 1. Embracing secure, scalable BYOD with Sencha and Centrify Presented by:
  • 2. Contents - Technology Trends and Challenges - App Development and Data Security - Managing Identity Sprawl - Integration 2
  • 3. Technology Trends And Challenges 3
  • 4. Technology Trends Shaping the Evolution of Enterprise Mobility Consumerization of IT Rapid Adoption of Mobile Enterprise Cloud Goes Mainstream Accelerating workforce virtualization • Personal devices becoming pervasive in the enterprise • Organizations must address challenges around BYOD • Opportunity for productivity gains and cost savings • Mobile device sales surpass PC sales • Mobility comes with heightened security risks • Driving a shift to mobile-first development • Cloud services gain acceptance for use in production • Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth • Collaboration with non-employees is the new normal • Managing access and data security is a major challenge • Organizational boundaries increasingly dynamic 4
  • 5. Brave new world… but IT management is losing control and visibility with increased: • Reliance on user-managed passwords • Adoption of SaaS and mobile apps • Proliferation of remote and untrusted devices IT needs a new model … that secures all devices… …solves the password problem… … and regains access control and visibility Users have lots more choices and use many more apps Users, apps and devices are no longer “behind the firewall” Mobile is the new, preferred way to access apps • End-users have too many passwords • Passwords are inherently weak • Many SaaS apps have a rich mobile client • Users have increasing numbers of devices accessing those apps 5
  • 6. A few facts… • 75% of security breaches involve compromised credentials • 71% targeted user devices • 58% perpetrated by insiders (takes 32 months to detect) • 13% leveraged misuse of privilege • Average cost $188 per record CIO: Testifying Before the Senate 56.95 57.95 58.95 59.95 60.95 61.95 62.95 63.95 64.95 65.95 0 1 2 3 $pershare Months After Breach $5.37 Billion in shareholder value lost Breach disclosed in media 6
  • 7. What IT cares about 1. Enable employee productivity 2. Ensure compliance requirements are addressed 3. Efficient management 7 1. Optimize efficiency of their developer teams 2. Deliver apps that meet business and end-user requirements 3. Maximize the useful lifetime of the app What App Dev Managers care about Aligning Objectives
  • 8. App Development And Data Security 8
  • 9. The cost of mobility can erode its ROI Inefficient mobility and security wastes resources Write Code Test Publish to app market Deploy Update $ $ $ $ $ Each part of the app development process incurs expenses… Write Code Test Publish to AppStore Deploy Update $ $ $ $ $ Write Code Test Publish to app market Deploy Update $ $ $ $ $ …which multiply with each new supported mobile OS/device platform Management Security And these processes and apps need to be managed and secure to limit risk
  • 10. Challenges The security landscape has raised the stakes Security is increasingly challenging  Targeted attacks  Spear phishing and social engineering  Mobile malware  Advanced Persistent Threats  Rising cost of data breaches How do you manage the tradeoffs between  Operational flexibility  Security  Cost and complexity  End-user experience $
  • 11. End-to-End Data Security • Data security means protecting confidentiality and integrity of data • Management and enforcement across three modes of data use 1. At-rest – When data is stored on a device 2. In-motion – When data is traversing the network 3. In-use – When a user interacts with the data through an app on a device • Ensuring data security as data moves across the range of untrustworthy networks and devices is not trivial Overview
  • 13. From: The Rise of Data-Driven Security, EMA Research Report, 2012 © 2012 Enterprise Management Associates, Inc. The Impact of Fragmented Identity • The ideal can be hard to achieve when identity is scattered among • Applications • Systems • Endpoints • Mobile devices • Third party apps • Networks • On premises • SaaS, Cloud • Etc. … Poor integration among security tools Too difficult to distinguish which security actions or policies are working and which are ineffective or unnecessary Most significant frustrations with IT security technologies? Top 2 responses: 13
  • 14. Multiple identities + Password Sprawl Create risk • Multiple logins for users • Multiple identity infrastructures for IT to manage In- house Apps and 100’s more….Laptops Smartphones and Tablets ID ID ID ID ID ID ID ID ID ID 14
  • 15. Federated Identity Where users have one login ID and password And IT has one Federated Identity Infrastructure to manage End Users Laptops Smartphones and Tablets ID 15
  • 16. Strengthen Security with Federated Identity • Federated Identity ensures that users only need to use their AD userid/password – Only one password to remember – Password is protected by the Enterprise in AD • AD-based federation provides several advantages for IT – Leverages existing account and password policies – simplifying management – Ensures that IT controls access eliminating risk of orphaned accounts Federation Trust Cloud Proxy Server IDP as a Service Firewall ID ID 16
  • 17. Integrated Solution Easily Manage Apps, Data, And Users 17
  • 18. Sencha Space Benefits  Streamline app development process –Eliminate PhoneGap/Cordova  Deliver HTML5 apps directly to end-users through a managed, secure runtime platform Easily mobilize existing web and HTML5 apps  Helps protect your apps and data by  Managing user access  Remotely wiping your data from devices as needed  Keeping your business data separate from other data on the device  Leverage developer APIs for a rich application experience
  • 19. Sencha Space • Management Overvie Management Console • Provides centralized management of the user, data, and application lifecycles • Allows administrators to enforce policy consistently • Set minimum PIN length • Specify group membership • Provision apps to groups • Configure advanced user authentication • Enable SSL VPN connectivity • Facilitates reporting and auditing with detailed usage analytics Space Management Centralized Admin Console Policy Engine Identity and Access App Delivery Data Security Network Security
  • 20. •Supports iOS and Android (Win Phone 8 and Blackberry in beta) •Segregates business and personal data •Secures business data with strong encryption and digital signatures •Enforces policies downloaded from the console •Facilitates secure, managed use of HTML5 apps •Provides developer API to OS/Device features for rich, modern, mobile user experience Mobile Client Application Sencha Space Client Overview
  • 21. Sencha Space Security •Data Encryption – All data is stored encrypted in Space to protect the confidentiality of sensitive, proprietary information •Network Security – All data transmitted between the Space client app and management server is SSL-encrypted •VPN Support – Integration with Cisco and Juniper clientless SSL VPN for secure connectivity between the Space client app and back-end data center assets •Authentication – Single sign-on support using widely accepted SAML open standard Security Key Benefits • Reduce the risk of data breach • Grant access to applications and data based only on business need • Deploy applications securely to anyone on any device
  • 22. Sencha Space Overview of Capabilities and Benefits Component Capabilities Benefits Security • Secure data in-motion and at-rest • Manage user access entitlements • Manage risk • Facilitate compliance Policy Engine • Set and enforce consistent usage and security policies • Deploy applications instantly • Block users/devices instantly • Improve operational efficiency • Manage mobility risk Analytics • Monitor activity at the user and device level • Track application activity • Facilitate audit and reporting • Enhance operational visibility Developer API • Provide consistent API access to native device/OS capabilities • Provide developer access to Space platform capabilities • Help reduce the cost of cross-platform development
  • 23. Centrify Cloud Services = Unified Identity Services + Centrify Cloud Services Centrify Software • Authentication / Single Sign-On (SSO) • Auditing and reporting • Self-service portal • Mobile application management • Encryption of data-in-motion • Policy Enforcement • Authorization and role-based access control • Mobile Zero Sign-on (ZSO) • Mobile device management • etc. 23
  • 24. Centrify Cloud Service Centrify for iOS Centrify for Android Centrify Cloud Proxy Server Centrify DirectManage Framework DirectManage ADUC Extension DirectManage Group Policy Extension Microsoft Certificate Authority Firewall Centrify for Mac Active Directory-based Security Infrastructure Centrify Cloud Manager Centrify for SaaS Centrify Cloud Services 24
  • 25. Centrify Cloud Proxy Server Centrify Cloud Service Centrify for SaaS Centrify Cloud Manager Firewall Centrify for SaaS • One click SaaS SSO leveraging Active Directory credentials • SSO Integration with SaaS via SAML, HTTP, proprietary API, OAuth, Open ID connect • User self-service for mobile devices (e.g. location, wipe, lock) • User self-service for AD account (e.g. edit attributes, reset password) • Common administration tools for mobile and SaaS applications SaaS Apps SaaS and Mobile App Catalog You Are Here ISV Onboard Centrify Cloud Services Microsoft Certificate Authority Active Directory-based Security Infrastructure 25
  • 26. Centrify Cloud Proxy Server Centrify Cloud Service Microsoft Certificate Authority Centrify Cloud Manager Firewall SaaS Apps Mobile App Centrify for iOS and Android Active Directory-based Security Infrastructure Centrify for Mobile Applications • Device is authenticated and joined to Active Directory • Enables silent authentication aka Zero Sign-On (ZSO) for mobile apps via simple integration with Centrify Mobile Authentication SDK • Mobile apps interacts with Centrify cloud services for authn and authz • Mobile app can also access information about user attributes in AD • App settings can be centrally managed based on AD Group Policy • Remote wipe of Mobile App & Data • Common administration tools for mobile and SaaS applications SaaS and Mobile App Catalog You Are Here ISV Onboard Centrify Cloud Services 26
  • 27. Centrify Simplifies SaaS/Mobile Federated Auth Integrate Mobile App Authentication provides true enterprise Zero Sign- On • Mobile app authenticates and registers AD as it’s identity provider • Mobile app can access information about user attributes in AD • Mobile app gains SSO to backend services Cloud Proxy Server IDP as a Service Firewall Mobile OS Mobile App Mobile Auth SDKMDM Step 2 One time user authentication & device registration Step 1 Web Application Registration Step 4 Token based Authentication Step 3 Token Generation Hosted Application ID 27
  • 28. Extend Identity Services to Mobile Platforms Mobilize app and service access – Enable mobile access to Enterprise services and applications – Design mobile interfaces to seamlessly integrate with the Enterprise services Containerization to separate work from personal – Protect work applications and data from data leakage – Provide the laptop experience on mobile, unlock and access all business apps Centralize mobile and application administration – Enabling IT to manage security policies for Mobile, Workstations and Servers – Unifying app management into one interface for Mobile, Web and SaaS Apps – Leveraging automated lifecycle management through AD 28
  • 29. Integrated Solution How Sencha And Centrify Technology Can Help 29
  • 30. Cloud Proxy Server Firewall Hosted Application aka Sencha Space Cloud Service Step 1 Web Application Registration Step 3 Token based Authentication Step 2 Token Generation ID Centrify IDP as a Service Centrify + Sencha for Cloud SaaS Apps Mobile OS Sencha Space App Auth Client 30
  • 31. Integrated Solution Demo Of SAAS Application 31
  • 32. Cloud Proxy Server Firewall Internal Application Step 3 Token based Authentication Step 2 Token Generation ID Centrify + Sencha for Internal SaaS Apps Step 1 Web Application Registration Mobile OS Sencha Space App Auth Client Centrify IDP as a Service 32
  • 33. Integrated Solution Demo Of Internal Application 33
  • 34. Resources Centrify • Centrify IDaaS, MDM and MAM: https://www.centrify.com/cloud/clo ud-service-registration.asp • Centrify Developers: http://developers.centrify.com • Questions: sumana.annam@centrify.com • Twitter: @centrify, @annamsr Sencha • Sencha Space http://www.sencha.com/space • Get started with a free trial in less than 5 minutes! https://manage.space.sencha.com • Questions: space-feedback@sencha.com • Twitter: @sencha, @nharlow 34