SlideShare uma empresa Scribd logo
1 de 33
1 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
Impact of Mobile computing on IT
Ashish Jain
Director, Product Management, VMware
@itickr
July 2013
2 Confidential
Mobile Devices are everywhere
3 Confidential
The Requirements we used to have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through Ownership
An application you own,
running on a server you own
People you employ
Using a network you
own to connect to…
Using software you own on a
Windows desktop you own
4 Confidential
What the world wants now…
Control & Governance is Becoming
More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn‟t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows OSs
Employees, contractors
outsourcers, partners
citizens, students
5 Confidential
New Device Platforms New Apps New User Expectations
Three trends are forcing massive change on IT
New Device
Platforms
 A new way to work
 Not just Windows anymore
New User
Expectations
 Collaboration with partners,
contractors, and customers
 Productivity through better technology
New
Apps
 SaaS, mobile apps
 Diversity
New Apps New User ExpectationsNew Device Platforms
6 Confidential
Mobility is Changing Everything:
0
300
600
900
2009 2010 2011 2012
Smartphones and tablets PC shipments
of information workers use
three or more devices for
w o r k t o i n c r e a s e
p r o d u c t i v i t y
EXPLOSIVE
GROWTH
in shipments of
smartphones and tablets
Sources: IDC, BGR, Forrester
FLAT
pc shipments
New Device Platforms New Apps New User ExpectationsNew Device Platforms
BYOD & JIT
7 Confidential
The Changing Device Mix
148 141
202 240
128
352
722
1516
0
1000
2000
2012 2017
Smartphone
Tablet
Portable PC
Desktop PC
Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013
Connected Device Market by Product Category,
Shipments, 2012-2017 in Millions
8 Confidential
New Apps are Flooding the Enterprise
R a t i o o f m o b i l e a p p
development projects to native
P C p r o j e c t s i n 2 0 1 5
PACE OF TECHNOLOGY
ADOPTION IS
ACCELERATING
PC
100M USERS
20YEARS
INTERNET
100M USERS
10YEARS
MOBILE
100M USERS
5YEARS
% OS Neutral % Browser Specific % Windows
1996
CROSSOVER
POINT
Apps in the Enterprise
2011 2020
0%
100%
50%
New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms
Sources: Gartner, Internal VMware Analysis
App & Data Independence
9 Confidential
New User Expectations for Productivity are Driving IT to
Evolve
ENTERPRISE END USER COMPUTING
“88% of executives report
employees are using
their personal computing
technologies for
business purposes”
DEMAND ACCESS
FROM ANYWHERE
“9 out of 10 companies
report the use of
consumer technologies
in the workplace”
BETTER CONSUMER
TECHNOLOGIES
“74% of employees
use consumer
technologies due to
lack of compelling
alternatives from IT”
LACK OF CHOICES
FROM IT
New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations
Sources: IDC, Avanade
Innovate or Perish
10 Confidential
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
11 Confidential
The Mobile Landscape
12 Confidential
OS
In million
of units
Market share
Android 497,1 68,8%
iOS 135,9 18,8%
Blackberry 32,5 4,5%
Symbian 23,9 3,3%
Windows Phone 17,9 2,5%
TOTAL 722,4 100,0%
52%
19%
14%
8%
2% 5%
Android iOS
Symbian Blackberry
Windows Phone Others
2012 Smartphones Global Trends
12
Smartphones worldwide shipment 2012
Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013
Source: TomiAhonen Almanac 2013
1.3B smartphones in use
Smartphones worldwide installed based
as of December 2012
13 Confidential
2013 Data – Android continues its momentum…
14 Confidential
OS Trends
15 Confidential
Smartphones Trends in Key Markets
North America
Population:354M
Nb of Smartphones:210M
Shipment 2012
Android 71M
iOS 49M
Blackberry 5M
Windows 3M
Western Europe
Population:406M
Nb of Smartphones:260M
Shipment 2012
Android 69M
iOS 26M
Blackberry 9M
Symbian 4M
Windows 5M
Mature Asia/Pacific
Population:82M
Nb of Smartphones:60M
Shipment 2012
Android 28M
iOS 14M
Blackberry 1M
Symbian 3M
Others 3M
Greater China
Population:1540M
Nb of Smartphones:283M
Shipment 2012
Android 79M
iOS 31M
Windows 2M
Bada 1M
Symbian 0,5M
16 Confidential
Android Landscape
 Widely popular in developing countries
• Lots of choice – screen size, price, capabilities, etc.
 Not much traction in enterprise segment
• Security
• Perception is that Android is not secure
• Google Play is „wild wild west‟
• Enterprise features (eg: MDM) weak
• Fragmentation
• No two devices are the same in terms of capabilities or UI
• Hard for IT to support diverse environment
• Lack of control
• OS upgrades are controlled by carrier/OEM
• Security patches not pushed out in a timely manner
 OEMs starting to add capabilities
17 Confidential
Android Fragmentation
18 Confidential
Android Fragmentation
19 Confidential
iOS Landscape
 Popular in North America, Western Europe and other richer
geographical pockets
• Price rules them out in many developing countries
 In tune with enterprise opportunity and have great traction
• Increasing support for enterprise features in every hw and sw release
• Security
• Perception is that iOS is more secure than Android
• App Store is curated
• Strong enterprise features (encryption, MDM, etc.)
• Fragmentation
• Different screen sizes but not capabilities so perception is that there is no fragmention
in the Apple world
20 Confidential
iOS Landscape
21 Confidential
BlackBerry Landscape
 Was good standard in enterprise market
• Device Encryption
• Remote Wiping for lost/stolen
• Force password
• Provision secure Email, VPN, Wifi
 Missed BYOD trend completely and lost traction
 BB 10 is decent
• BlackBerry Balance – built in dual persona solution
• Small market share and not growing
 BB shops that didn’t already switch will likely stay with BB
 Most customers already started switching to a more strategic
platform
• Don‟t view BB as strategic anymore
• Migrating to iOS or Android or both
22 Confidential
Windows Landscape
 Windows Phone and Windows 8 are still early
• Windows Phone – more consumer oriented
• Windows Tablet seems to be more enterprise friendly and will likely get more
traction that Windows phones in 2014
 MSFT has deep pockets and will likely become the third dominant
mobile platform
• Distant third….
23 Confidential
Mobile App Distribution
24 Confidential
50 Billion (iOS) vs. 48B (Android)
25 Confidential
Consumer Apps published to “public stores”
Sources: Nielsen, May 16, 2012, VMware Customer Research.
Amazon appstore
+ Other Stores
26 Confidential
App Distribution options
 iOS App Distribution
• The Apple iOS App Store
• Ad hoc developer distribution
• Enterprise distribution
• The Apple Volume Purchase Program
• The Apple Custom B2B
 Android App Distribution
• Google Play
• Non-market resources
27 Confidential
Device & Application Management
28 Confidential
Anatomy of a Smartphone/Tablet
• Handheld Computer/Processor
• Communication Components
• Modem Chips
• Antenna
• Bluetooth
• WiFi
• Input/Output & Sensors
• Display
• Touchscreen
• Microphone/Speaker
• Cameras
• GPS
• Compass
• Accelerometer
• NFC
• USB
29 Confidential
Building iOS and Android Applications
 In order to construct a mobile app, need a “front end” – the bits
that run on the device / “the app”
 A disconnected app is typically not very interesting…so, we also
need to build a “back end” to support the app
Front End Back End
30 Confidential
Solving Mobility
Remote Windows desktop / applications
Web apps / HTML 5
Virtualized OS
31 Confidential
Current Approach Requires Managing the Whole Device
MobileDeviceManagement
Device
Apps &
Data
Corporate
Apps &
Data
What actually needs to be managed
by the enterprise
32 Confidential
© 2013 VMware Inc. All rights reserved
Confidential
We still have ways to go…
33 Confidential
Thank You!

Mais conteúdo relacionado

Mais procurados

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...CA API Management
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays
 
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015Fredrik Rönnlund
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIkirgy
 
Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it. Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it. Julien Lesaicherre
 
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind SugarCRM
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYODTrustwave
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security Mahima Anand Sharma
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiWithTheBest
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Nordic APIs
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gwGregg Wheeler
 
News in
News inNews in
News innewsin
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication? Sinch
 
Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIsLiz Slocum
 

Mais procurados (20)

Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewartapidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
 
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
Real-time data with a VaadinDrone in Bluemix at IBM InterConnect 2015
 
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer APIWearable Internet Chicken: Exploring the Android Wear Datalayer API
Wearable Internet Chicken: Exploring the Android Wear Datalayer API
 
Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it. Big on Mobile, Big on Facebook. How the European super startups did it.
Big on Mobile, Big on Facebook. How the European super startups did it.
 
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind Mobile: Session 1:  Why Companies Who Use Mobile are Still Falling Behind
Mobile: Session 1: Why Companies Who Use Mobile are Still Falling Behind
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
The state of mobile app security
The state of mobile app security The state of mobile app security
The state of mobile app security
 
Financial services rely on APIs
Financial services rely on APIsFinancial services rely on APIs
Financial services rely on APIs
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gw
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
News in
News inNews in
News in
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Current Landscape of Connected Car APIs
Current Landscape of Connected Car APIsCurrent Landscape of Connected Car APIs
Current Landscape of Connected Car APIs
 

Semelhante a MDM/MAM/MIM Workshop - CIS 2013

CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCloudIDSummit
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc erasolarisyourep
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014IMC Institute
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions Troy C. Fulton
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
The mobile ecosystem
The mobile ecosystemThe mobile ecosystem
The mobile ecosystemMelis Rimer
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014The Judge Group
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 

Semelhante a MDM/MAM/MIM Workshop - CIS 2013 (20)

CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Presentation end-user computing in the post-pc era
Presentation   end-user computing in the post-pc eraPresentation   end-user computing in the post-pc era
Presentation end-user computing in the post-pc era
 
IT Technology Trends 2014
IT Technology Trends 2014IT Technology Trends 2014
IT Technology Trends 2014
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Moving mobility forward 10 mobile predictions
Moving mobility forward   10 mobile predictions  Moving mobility forward   10 mobile predictions
Moving mobility forward 10 mobile predictions
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobile Ecosystem
Mobile EcosystemMobile Ecosystem
Mobile Ecosystem
 
The mobile ecosystem
The mobile ecosystemThe mobile ecosystem
The mobile ecosystem
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Mobile in 2015 - eduWeb 2014
Mobile in 2015 -  eduWeb 2014Mobile in 2015 -  eduWeb 2014
Mobile in 2015 - eduWeb 2014
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 

Mais de Ashish Jain

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User ExperienceAshish Jain
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalAshish Jain
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Ashish Jain
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPalAshish Jain
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalAshish Jain
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityAshish Jain
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010Ashish Jain
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled waterAshish Jain
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security IssuesAshish Jain
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 

Mais de Ashish Jain (13)

PayPal OpenID User Experience
PayPal OpenID User ExperiencePayPal OpenID User Experience
PayPal OpenID User Experience
 
UsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPalUsingMiles - OpenID Retail Summit at PayPal
UsingMiles - OpenID Retail Summit at PayPal
 
Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal Angies List - OpenID Retail Summit at PayPal
Angies List - OpenID Retail Summit at PayPal
 
eBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPaleBay - OpenID Retail Summit at PayPal
eBay - OpenID Retail Summit at PayPal
 
Spec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPalSpec Update - OpenID Retail Summit at PayPal
Spec Update - OpenID Retail Summit at PayPal
 
OpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal IdentityOpenID Retail Summit at PayPal - PayPal Identity
OpenID Retail Summit at PayPal - PayPal Identity
 
PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010PayPal Identity Services - Innovate 2010
PayPal Identity Services - Innovate 2010
 
Open Id Summit
Open Id SummitOpen Id Summit
Open Id Summit
 
Say no to Bottled water
Say no to Bottled waterSay no to Bottled water
Say no to Bottled water
 
Open ID Security Issues
Open ID Security IssuesOpen ID Security Issues
Open ID Security Issues
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Concordia
ConcordiaConcordia
Concordia
 

Último

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

MDM/MAM/MIM Workshop - CIS 2013

  • 1. 1 Confidential © 2013 VMware Inc. All rights reserved Confidential Impact of Mobile computing on IT Ashish Jain Director, Product Management, VMware @itickr July 2013
  • 3. 3 Confidential The Requirements we used to have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through Ownership An application you own, running on a server you own People you employ Using a network you own to connect to… Using software you own on a Windows desktop you own
  • 4. 4 Confidential What the world wants now… Control & Governance is Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn‟t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 5. 5 Confidential New Device Platforms New Apps New User Expectations Three trends are forcing massive change on IT New Device Platforms  A new way to work  Not just Windows anymore New User Expectations  Collaboration with partners, contractors, and customers  Productivity through better technology New Apps  SaaS, mobile apps  Diversity New Apps New User ExpectationsNew Device Platforms
  • 6. 6 Confidential Mobility is Changing Everything: 0 300 600 900 2009 2010 2011 2012 Smartphones and tablets PC shipments of information workers use three or more devices for w o r k t o i n c r e a s e p r o d u c t i v i t y EXPLOSIVE GROWTH in shipments of smartphones and tablets Sources: IDC, BGR, Forrester FLAT pc shipments New Device Platforms New Apps New User ExpectationsNew Device Platforms BYOD & JIT
  • 7. 7 Confidential The Changing Device Mix 148 141 202 240 128 352 722 1516 0 1000 2000 2012 2017 Smartphone Tablet Portable PC Desktop PC Source: IDC's Worldwide Smart Connected Device Tracker Forecast Data, February 28, 2013 Connected Device Market by Product Category, Shipments, 2012-2017 in Millions
  • 8. 8 Confidential New Apps are Flooding the Enterprise R a t i o o f m o b i l e a p p development projects to native P C p r o j e c t s i n 2 0 1 5 PACE OF TECHNOLOGY ADOPTION IS ACCELERATING PC 100M USERS 20YEARS INTERNET 100M USERS 10YEARS MOBILE 100M USERS 5YEARS % OS Neutral % Browser Specific % Windows 1996 CROSSOVER POINT Apps in the Enterprise 2011 2020 0% 100% 50% New Device Platforms New Apps New User ExpectationsNew AppsNew Device Platforms Sources: Gartner, Internal VMware Analysis App & Data Independence
  • 9. 9 Confidential New User Expectations for Productivity are Driving IT to Evolve ENTERPRISE END USER COMPUTING “88% of executives report employees are using their personal computing technologies for business purposes” DEMAND ACCESS FROM ANYWHERE “9 out of 10 companies report the use of consumer technologies in the workplace” BETTER CONSUMER TECHNOLOGIES “74% of employees use consumer technologies due to lack of compelling alternatives from IT” LACK OF CHOICES FROM IT New Device Platforms New Apps New User ExpectationsNew Apps New User Expectations Sources: IDC, Avanade Innovate or Perish
  • 10. 10 Confidential IT’s Objective for End User Computing Infrastructure Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 12. 12 Confidential OS In million of units Market share Android 497,1 68,8% iOS 135,9 18,8% Blackberry 32,5 4,5% Symbian 23,9 3,3% Windows Phone 17,9 2,5% TOTAL 722,4 100,0% 52% 19% 14% 8% 2% 5% Android iOS Symbian Blackberry Windows Phone Others 2012 Smartphones Global Trends 12 Smartphones worldwide shipment 2012 Source: IDC Worldwide Mobile Phone Tracker, February 14, 2013 Source: TomiAhonen Almanac 2013 1.3B smartphones in use Smartphones worldwide installed based as of December 2012
  • 13. 13 Confidential 2013 Data – Android continues its momentum…
  • 15. 15 Confidential Smartphones Trends in Key Markets North America Population:354M Nb of Smartphones:210M Shipment 2012 Android 71M iOS 49M Blackberry 5M Windows 3M Western Europe Population:406M Nb of Smartphones:260M Shipment 2012 Android 69M iOS 26M Blackberry 9M Symbian 4M Windows 5M Mature Asia/Pacific Population:82M Nb of Smartphones:60M Shipment 2012 Android 28M iOS 14M Blackberry 1M Symbian 3M Others 3M Greater China Population:1540M Nb of Smartphones:283M Shipment 2012 Android 79M iOS 31M Windows 2M Bada 1M Symbian 0,5M
  • 16. 16 Confidential Android Landscape  Widely popular in developing countries • Lots of choice – screen size, price, capabilities, etc.  Not much traction in enterprise segment • Security • Perception is that Android is not secure • Google Play is „wild wild west‟ • Enterprise features (eg: MDM) weak • Fragmentation • No two devices are the same in terms of capabilities or UI • Hard for IT to support diverse environment • Lack of control • OS upgrades are controlled by carrier/OEM • Security patches not pushed out in a timely manner  OEMs starting to add capabilities
  • 19. 19 Confidential iOS Landscape  Popular in North America, Western Europe and other richer geographical pockets • Price rules them out in many developing countries  In tune with enterprise opportunity and have great traction • Increasing support for enterprise features in every hw and sw release • Security • Perception is that iOS is more secure than Android • App Store is curated • Strong enterprise features (encryption, MDM, etc.) • Fragmentation • Different screen sizes but not capabilities so perception is that there is no fragmention in the Apple world
  • 21. 21 Confidential BlackBerry Landscape  Was good standard in enterprise market • Device Encryption • Remote Wiping for lost/stolen • Force password • Provision secure Email, VPN, Wifi  Missed BYOD trend completely and lost traction  BB 10 is decent • BlackBerry Balance – built in dual persona solution • Small market share and not growing  BB shops that didn’t already switch will likely stay with BB  Most customers already started switching to a more strategic platform • Don‟t view BB as strategic anymore • Migrating to iOS or Android or both
  • 22. 22 Confidential Windows Landscape  Windows Phone and Windows 8 are still early • Windows Phone – more consumer oriented • Windows Tablet seems to be more enterprise friendly and will likely get more traction that Windows phones in 2014  MSFT has deep pockets and will likely become the third dominant mobile platform • Distant third….
  • 24. 24 Confidential 50 Billion (iOS) vs. 48B (Android)
  • 25. 25 Confidential Consumer Apps published to “public stores” Sources: Nielsen, May 16, 2012, VMware Customer Research. Amazon appstore + Other Stores
  • 26. 26 Confidential App Distribution options  iOS App Distribution • The Apple iOS App Store • Ad hoc developer distribution • Enterprise distribution • The Apple Volume Purchase Program • The Apple Custom B2B  Android App Distribution • Google Play • Non-market resources
  • 27. 27 Confidential Device & Application Management
  • 28. 28 Confidential Anatomy of a Smartphone/Tablet • Handheld Computer/Processor • Communication Components • Modem Chips • Antenna • Bluetooth • WiFi • Input/Output & Sensors • Display • Touchscreen • Microphone/Speaker • Cameras • GPS • Compass • Accelerometer • NFC • USB
  • 29. 29 Confidential Building iOS and Android Applications  In order to construct a mobile app, need a “front end” – the bits that run on the device / “the app”  A disconnected app is typically not very interesting…so, we also need to build a “back end” to support the app Front End Back End
  • 30. 30 Confidential Solving Mobility Remote Windows desktop / applications Web apps / HTML 5 Virtualized OS
  • 31. 31 Confidential Current Approach Requires Managing the Whole Device MobileDeviceManagement Device Apps & Data Corporate Apps & Data What actually needs to be managed by the enterprise
  • 32. 32 Confidential © 2013 VMware Inc. All rights reserved Confidential We still have ways to go…

Notas do Editor

  1.  
  2. Sources:US numbers: http://www.comscore.com/fre/Insights/Press_Releases/2013/5/comScore_Reports_March_2013_U.S._Smartphone_Subscriber_Market_Share
  3. http://blog.nielsen.com/nielsenwire/?p=31891