SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
The Platform for Mobile IT
Daan Hakaart
EMEA Sales Director
Mobile drives a fundamental shift in behavior
    Desktop as primary               Mobile as primary



                Salesforce



               Task workers



            Knowledge workers



           Industry-specific roles



2
The birth of Mobile IT

                     Mobile                    IT




     User-led               Cross-functional          Consumer speed

Multi-OS                                            Consumerization
                                 Security,
UX-driven                      management,          Short lifecycles
                               and apps are
                                intertwined
Innovation-centric                                  Micro apps



  “The more the CIO says no, the less secure the organization becomes.”
3
                     Vivek Kundra, U.S. Federal CIO
Mobile IT transforms business

    Financial Services                     Professional Services




                                           Retail & Consumer Goods
    Government & Education




                                           Technology & Manufacturing


    Healthcare, Pharma & Medical Devices


                                           Travel and Hospitality




4
Mobile IT requirements in the post-PC era


     Prevent data loss


     Mobilize apps and documents


     Preserve user experience and privacy


     Support mobile OS and device evolution


     Deploy at scale across global organizations



5
is …
                                                                                 2




                                                                 (Tunneling and Access Control)
             1    End-User Services




                                                                                                                      Enterprise Infrastructure
                                                                      Intelligent Gateway
3   Mobile Policy & Configuration Engine




        DEVICES          APP               CONTENT    RULES &                                         USER         CERTS &
    6                 STOREFRONT                     REPORTING                                    SELF-SERVICE   DIRECTORY
MobileIron advantage


         Purpose-built for    Architected for
            Mobile IT             scale




                               Most trusted
          Best at apps           cloud



                                                3,000 customers in 24 months
                                                97% customer support satisfaction
                                                60+ customers in print
                                Focused on
         Best at security    customer success




7
Industry recognition
       Gartner:       Leaders Quadrant of 2012 MDM Magic Quadrant (May 2012)
     Info-Tech:       Champion in 2012 MDM Vendor Landscape (Aug 2012)
           IDC:       Largest and fastest growing mobile enterprise management specialist (Sept 2012)
BusinessWeek:         One of five hottest enterprise startups (Sept 2012)


                               2012 Magic Quadrant for Mobile                                                                              2012 MDM Vendor Landscape
                                Device Management Software
                                     (Reprint available from MobileIron)


                                                                                                                                                                                             AirWatch
                                                                                                                                                                                                 MobileIron

                                                                                                                                                                                       Zenprise
                                                                                                                                                                            BoxTone
                                                                                                                                                                                   SOTI           Fiberlink




                                                                                                                                                 Sophos             SAP




                                                                                                                                                                 RIM                   Good
                                                                                                                                            McAfee




                                                                                                                                                     Symantec



            Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Philip Redman, John Girard,
            and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research
            document and should be evaluated in the context of the entire document. The Gartner document is available                                        August 2012
            upon request from https://info.mobileiron.com/gartner-magic-quadrant.html.
                                                                                                                            Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August
            Gartner does not endorse any vendor, product or service depicted in its research publications, and does not     2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in
            advise technology users to select only those vendors with the highest ratings. Gartner research publications    the technology marketplace. Assessing vendors by the strength of their offering and their
            consist of the opinions of Gartner's research organization and should not be construed as statements of fact.   strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the
            Gartner disclaims all warranties, expressed or implied, with respect to this research, including any            contribution of exceptional vendors in a particular category.
            warranties of merchantability or fitness for a particular purpose




   8
MobileIron across the Mobile IT lifecycle
                                                                                    6    Monitor risk
1         Configure securely

                Email and apps                                                      7    Control access
               Policy and identity           5       Manage inventory
            Connectivity (Wi-Fi, VPN)
        By group, individual, or ownership
                                                                                    8    Enforce identity
                                                                                                                   Security


2         Integrate tightly                                                         9    Automate workflow

                   Email
                                                             Across OS
                  AD/LDAP
                                                        For apps and devices
                 Certificates
                    BES
                                                  For BYOD and corporate programs   10   Access and protect docs

                                                                                                                    Docs
3         Protect privacy
                                                                                    11   Deliver apps at scale
              BYOD programs
             Regional regulations
                                                                                    12   Protect app container

                                                                                                                    Apps
4         Roll out at scale                                                         13   Tunnel app data


                 Group-based
              User self-service
            Multi-tier management            15     Wipe corporate data             14   Limit roaming costs


    9
MobileIron architecture: Deployment
                                                       Multi-OS




                                                                                                                                 Delivery Network                          Datacenter
Internet




                                                 Apps@Work         (Enterprise app storefront)
                                                 Docs@Work         (Secure document container)
                                                 Secure data       (Privacy, identity, compliance)                                                               MobileIron    Apple      Google
                                                 Trusted apps      (Secure app containers)                                     App Delivery Network
                                                                                                                                (High volume delivery)




                                                                                                                                       Note: MobileIron VSP, Sentry, and Atlas can be deployed
                                                                                                                                               behind the corporate firewall if desired
DMZ




                                Sentry (Intelligent gateway)      VSP (Publishing, policy, config, identity, automation)
                                   (Physical or virtual)           Atlas (Central console, reporting, multi-tier mgmt)
                                                                               (Physical, virtual, or cloud)
Corporate Network




                                                                      Enterprise                     Certificate              LDAP                    Administrators          End Users
                                                                     Applications                    Authority

                    Email/PIM                                  Apps/Content                                        Security                                          Users



10
Mobile IT challenge: Two unstoppable forces




     App Storm                  Content Wave




                 CIO mandate:
                 Create value
                 Protect data
                  Move fast
11
MobileIron across the apps lifecycle

       Distribute             Containerize                  Tunnel

                          Protect data-at-rest       Protect data-in-motion


                                          App
                                          SDK



                                                                     App
            Private                       App                        Tunnel
            Storefront                    Wrapping
            App
            Delivery     Dynamic Policy
            Network
                         Authentication
                         Authorization
             App
             Control     Configuration
                         Usage Tracking
                         Deletion

     Apps@Work           AppConnect                    AppTunnel

12
MobileIron architecture: Full app lifecycle
                                                            Components
                                            Apps@Work
                                            • Private app storefront
                                            • Tied to device identity and posture
                                            • Selective wipe of app data
                                            • Industry-leading user experience

                                            App Delivery Network (AppDN)
                                            • Highly scalable app distribution

                                            App Control
                                            • Blacklist and whitelist

                                            AppConnect
App requirements:                           • Data protection: encryption, single sign-on
• Secure app distribution                   • DLP: secure app-to-app communications
• Scalable downloads                        • App-specific data wipe
• Data loss prevention for data-at-rest     • Security wrapper or SDK
• Data loss prevention for data-in-motion
• Protection from rogue apps                AppTunnel
                                            • Secure tunnel for app traffic through Sentry


 13
MobileIron architecture: Content management
                                                               Components
                                               Intelligent gateway (Sentry)
                                               • Protection of email attachments

                                               Secure content hub (Docs@Work)
                                               • Secure viewing of email attachments
                                               • Secure access to SharePoint docs
                                               • Secure on-device storage
                                               • Cut/copy/paste restrictions
                                               • No “Open in” access for rogue apps
                                               • Doc selective wipe if out of compliance

                                               Context-aware policy and identity
                                               • Tight integration with existing group-based
Content security requirements:                   security and remediation polices
• Data loss prevention for email attachments
• Secure distribution of SharePoint            Enterprise architecture
• … without new repository or storage cost     • Tight integration with existing content systems
                                               • No new content repository required
                                               • No new storage required



  14
MobileIron architecture: Layered security
                                                             Components
                                            Intelligent gateway
                                            • Email access and attachment control
                                            • Secure tunnel for email, apps, docs

                                            Secure containers for apps and docs
                                            • Distribution, deletion, data protection

                                            BYOD groups and controls
                                            • Privacy policy and selective wipe

                                            Compliance and automated remediation
                                            • Posture detection: OS, apps, encryption
                                            • Workflow: notification, access, quarantine, wipe
Multiple layers of security requirements:
• Email access and attachments              Identity
• Apps and docs                             • AD/LDAP integration (group, OU, user)
• BYOD data separation and privacy          • On-board or external certificate authority
• Rogue app access                          • Secure multi-user with fast switching
• Compromised devices
                                            Baseline security and configuration
• Lost devices
                                            • Lock, wipe, password, secure Wi-Fi/VPN
… without damaging user experience


  15
MobileIron architecture: Real-world scale
                                                            Components
                                            Operational scale (on-premise and cloud)
                                            • 100,000 devices per appliance
                                            • 20,000 registrations per hour
                                            • Biggest single certs site: 150,000 certs deployed

                                            Apps scale (App Delivery Network)
                                            • No limit on app size
                                            • No impact on corporate network
                                            • Fast download performance for user

                                            Low total cost of ownership
                                            • Easy installs and upgrades
                                            • No DBA, Windows patching, server licenses
Large enterprise requirements:              • 1 FTE can manage 10,000 to 20,000 devices
• Deploy 100,000+ devices
• Deploy 100MB+ sized apps                  Scale testing
• Deploy 100,000+ certificates              • TRUST – Test Reliability Under STress –
• Manage with low total cost of ownership      automation system – unique in industry
                                            • MDM/MAM loads of 100,000+ devices



 16
MobileIron investment in customer success

                     World-class global technical support and services



                     Domain expertise around mobility best practices


     Training and            Best practice       Evaluation           Peer
     certification             toolkits          companion          community

                          BYOD, Apps, Android,
                           Large Deployments

                                Prepare
                                Develop
                                Roll out
                                Sustain

17
What customers are saying …
  MobileIron provides               As the Director of Information Technology, I have been working with
  great support and                 technology solutions providers and their associated vendor support
  actually listens to               personnel for many years. Ms. B’s knowledge, professionalism,
  customer feedback.                client relationship skills, and mentoring capabilities far surpassed the
                                    abilities of the technical representatives from other vendors.

                                    My staff and I were extremely impressed with Ms. B’s performance
  This is hands-down the most       and believe that her capabilities and those of her team help
  comprehensive set of BYOD         distinguish the MobileIron solutions from the competition.
documentation I have seen from
    a single source to date.



                        MobileIron University in
                        general is just awesome—         The MobileIron team is extremely responsive to
                        it's been an incredible          customer needs. I have seen the platform
                        resource for me                  growing from Beta all the way to become a
I learned more                                           leader in the Gartner Quadrant. That happens
during the sessions                                      because MobileIron listens to its customers.
than I did during
the last 6 months
running our
mobility project
                             In this day and age of bad customer service, my
                            experience with MobileIron has been consistently great
                            and this last request for help was the best yet.

  18
Companies are building a new Mobile IT stack

Identity
                   Credentials       SSO         Persona




Content
                                  Distribution     Data
                    Authoring    (content hub)   security   Collaboration




Apps
                                 Distribution      Data
                     App dev     (app store)     security




Security
& mgmt
                   Global mgmt     Security      Access




Network
services
           Voice      Data           Wi-Fi        VPN           CDN


 19
MobileIron focus

Identity
                   Credentials       SSO         Persona




Content
                                  Distribution     Data
                    Authoring    (content hub)   security   Collaboration




Apps
                                 Distribution      Data
                     App dev     (app store)     security




Security
& mgmt
                   Global mgmt     Security      Access




Network
services
           Voice      Data           Wi-Fi        VPN           CDN


 20
Next set of Mobile IT challenges

     OS turbulence is the norm: Must support 3+ OS


     Boundaries blur: Content vs. app, mobile vs. desktop


     Shadow IT explodes for apps: Innovation or chaos?


     “I am my own CIO”: Help-yourself-desk


     Identity becomes strategic: Glue for mobile enterprise


21
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Mais conteúdo relacionado

Mais procurados

Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstEd Brill
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
MobileIron Expert Orientation
MobileIron Expert OrientationMobileIron Expert Orientation
MobileIron Expert OrientationLisa White
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry
 

Mais procurados (20)

Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy4 Stages of a Smart Mobile Strategy
4 Stages of a Smart Mobile Strategy
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
MobileIron Expert Orientation
MobileIron Expert OrientationMobileIron Expert Orientation
MobileIron Expert Orientation
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 

Destaque

DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
MicroStrategy World 2014: Scaling MicroStrategy at eBay
MicroStrategy World 2014: Scaling MicroStrategy at eBayMicroStrategy World 2014: Scaling MicroStrategy at eBay
MicroStrategy World 2014: Scaling MicroStrategy at eBayTim Case
 
Samsung STPD & 4 P's
Samsung STPD & 4 P'sSamsung STPD & 4 P's
Samsung STPD & 4 P'sHari Thirumal
 
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanThe 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanEmre Sarcan
 
Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)Mudbrick McFinnigan
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 

Destaque (11)

DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
MicroStrategy World 2014: Scaling MicroStrategy at eBay
MicroStrategy World 2014: Scaling MicroStrategy at eBayMicroStrategy World 2014: Scaling MicroStrategy at eBay
MicroStrategy World 2014: Scaling MicroStrategy at eBay
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Google Marketing
Google MarketingGoogle Marketing
Google Marketing
 
Presentation on 4 g
Presentation on 4 gPresentation on 4 g
Presentation on 4 g
 
Samsung STPD & 4 P's
Samsung STPD & 4 P'sSamsung STPD & 4 P's
Samsung STPD & 4 P's
 
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanThe 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)Google Strategic Mktg Presentation (2010-2012)
Google Strategic Mktg Presentation (2010-2012)
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Semelhante a DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platformsDeepu S Nath
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Proliferation of Mobile Devices = Opportunity for Apps & Developers
Proliferation of Mobile Devices = Opportunity for Apps & DevelopersProliferation of Mobile Devices = Opportunity for Apps & Developers
Proliferation of Mobile Devices = Opportunity for Apps & DevelopersVDC Research Group
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudAntenna Software
 
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...Arrow ECS UK
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Robert Sutor
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) wipjam
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Caroline Lewko
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009findram
 
AN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAPPNATION
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteMasha Geller
 
Mobility market perspective and IBM’s mobile portal accelerator solution
Mobility market perspective and IBM’s mobile portal accelerator solutionMobility market perspective and IBM’s mobile portal accelerator solution
Mobility market perspective and IBM’s mobile portal accelerator solutionPerficient, Inc.
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 

Semelhante a DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security (20)

Meap and business platforms
Meap and business platformsMeap and business platforms
Meap and business platforms
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Proliferation of Mobile Devices = Opportunity for Apps & Developers
Proliferation of Mobile Devices = Opportunity for Apps & DevelopersProliferation of Mobile Devices = Opportunity for Apps & Developers
Proliferation of Mobile Devices = Opportunity for Apps & Developers
 
Apouc 2014-oracle mobile platform
Apouc 2014-oracle mobile platformApouc 2014-oracle mobile platform
Apouc 2014-oracle mobile platform
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective -  David Peacock...
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Trends in Mobile BI
Trends in Mobile BITrends in Mobile BI
Trends in Mobile BI
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition)
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)
 
Latest mobile app development trends
Latest mobile app development trendsLatest mobile app development trends
Latest mobile app development trends
 
Mobile Security Report 2009
Mobile Security Report 2009Mobile Security Report 2009
Mobile Security Report 2009
 
AN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - KeynoteAN IV SF SAP - Sanjay Poonen - Keynote
AN IV SF SAP - Sanjay Poonen - Keynote
 
APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen Keynote
 
Mobility market perspective and IBM’s mobile portal accelerator solution
Mobility market perspective and IBM’s mobile portal accelerator solutionMobility market perspective and IBM’s mobile portal accelerator solution
Mobility market perspective and IBM’s mobile portal accelerator solution
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 

Mais de Andris Soroka

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Andris Soroka
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
 

Mais de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security

  • 1. The Platform for Mobile IT Daan Hakaart EMEA Sales Director
  • 2. Mobile drives a fundamental shift in behavior Desktop as primary Mobile as primary Salesforce Task workers Knowledge workers Industry-specific roles 2
  • 3. The birth of Mobile IT Mobile IT User-led Cross-functional Consumer speed Multi-OS Consumerization Security, UX-driven management, Short lifecycles and apps are intertwined Innovation-centric Micro apps “The more the CIO says no, the less secure the organization becomes.” 3 Vivek Kundra, U.S. Federal CIO
  • 4. Mobile IT transforms business Financial Services Professional Services Retail & Consumer Goods Government & Education Technology & Manufacturing Healthcare, Pharma & Medical Devices Travel and Hospitality 4
  • 5. Mobile IT requirements in the post-PC era Prevent data loss Mobilize apps and documents Preserve user experience and privacy Support mobile OS and device evolution Deploy at scale across global organizations 5
  • 6. is … 2 (Tunneling and Access Control) 1 End-User Services Enterprise Infrastructure Intelligent Gateway 3 Mobile Policy & Configuration Engine DEVICES APP CONTENT RULES & USER CERTS & 6 STOREFRONT REPORTING SELF-SERVICE DIRECTORY
  • 7. MobileIron advantage Purpose-built for Architected for Mobile IT scale Most trusted Best at apps cloud 3,000 customers in 24 months 97% customer support satisfaction 60+ customers in print Focused on Best at security customer success 7
  • 8. Industry recognition Gartner: Leaders Quadrant of 2012 MDM Magic Quadrant (May 2012) Info-Tech: Champion in 2012 MDM Vendor Landscape (Aug 2012) IDC: Largest and fastest growing mobile enterprise management specialist (Sept 2012) BusinessWeek: One of five hottest enterprise startups (Sept 2012) 2012 Magic Quadrant for Mobile 2012 MDM Vendor Landscape Device Management Software (Reprint available from MobileIron) AirWatch MobileIron Zenprise BoxTone SOTI Fiberlink Sophos SAP RIM Good McAfee Symantec Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Philip Redman, John Girard, and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available August 2012 upon request from https://info.mobileiron.com/gartner-magic-quadrant.html. Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August Gartner does not endorse any vendor, product or service depicted in its research publications, and does not 2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in advise technology users to select only those vendors with the highest ratings. Gartner research publications the technology marketplace. Assessing vendors by the strength of their offering and their consist of the opinions of Gartner's research organization and should not be construed as statements of fact. strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the Gartner disclaims all warranties, expressed or implied, with respect to this research, including any contribution of exceptional vendors in a particular category. warranties of merchantability or fitness for a particular purpose 8
  • 9. MobileIron across the Mobile IT lifecycle 6 Monitor risk 1 Configure securely Email and apps 7 Control access Policy and identity 5 Manage inventory Connectivity (Wi-Fi, VPN) By group, individual, or ownership 8 Enforce identity Security 2 Integrate tightly 9 Automate workflow Email Across OS AD/LDAP For apps and devices Certificates BES For BYOD and corporate programs 10 Access and protect docs Docs 3 Protect privacy 11 Deliver apps at scale BYOD programs Regional regulations 12 Protect app container Apps 4 Roll out at scale 13 Tunnel app data Group-based User self-service Multi-tier management 15 Wipe corporate data 14 Limit roaming costs 9
  • 10. MobileIron architecture: Deployment Multi-OS Delivery Network Datacenter Internet Apps@Work (Enterprise app storefront) Docs@Work (Secure document container) Secure data (Privacy, identity, compliance) MobileIron Apple Google Trusted apps (Secure app containers) App Delivery Network (High volume delivery) Note: MobileIron VSP, Sentry, and Atlas can be deployed behind the corporate firewall if desired DMZ Sentry (Intelligent gateway) VSP (Publishing, policy, config, identity, automation) (Physical or virtual) Atlas (Central console, reporting, multi-tier mgmt) (Physical, virtual, or cloud) Corporate Network Enterprise Certificate LDAP Administrators End Users Applications Authority Email/PIM Apps/Content Security Users 10
  • 11. Mobile IT challenge: Two unstoppable forces App Storm Content Wave CIO mandate: Create value Protect data Move fast 11
  • 12. MobileIron across the apps lifecycle Distribute Containerize Tunnel Protect data-at-rest Protect data-in-motion App SDK App Private App Tunnel Storefront Wrapping App Delivery Dynamic Policy Network Authentication Authorization App Control Configuration Usage Tracking Deletion Apps@Work AppConnect AppTunnel 12
  • 13. MobileIron architecture: Full app lifecycle Components Apps@Work • Private app storefront • Tied to device identity and posture • Selective wipe of app data • Industry-leading user experience App Delivery Network (AppDN) • Highly scalable app distribution App Control • Blacklist and whitelist AppConnect App requirements: • Data protection: encryption, single sign-on • Secure app distribution • DLP: secure app-to-app communications • Scalable downloads • App-specific data wipe • Data loss prevention for data-at-rest • Security wrapper or SDK • Data loss prevention for data-in-motion • Protection from rogue apps AppTunnel • Secure tunnel for app traffic through Sentry 13
  • 14. MobileIron architecture: Content management Components Intelligent gateway (Sentry) • Protection of email attachments Secure content hub (Docs@Work) • Secure viewing of email attachments • Secure access to SharePoint docs • Secure on-device storage • Cut/copy/paste restrictions • No “Open in” access for rogue apps • Doc selective wipe if out of compliance Context-aware policy and identity • Tight integration with existing group-based Content security requirements: security and remediation polices • Data loss prevention for email attachments • Secure distribution of SharePoint Enterprise architecture • … without new repository or storage cost • Tight integration with existing content systems • No new content repository required • No new storage required 14
  • 15. MobileIron architecture: Layered security Components Intelligent gateway • Email access and attachment control • Secure tunnel for email, apps, docs Secure containers for apps and docs • Distribution, deletion, data protection BYOD groups and controls • Privacy policy and selective wipe Compliance and automated remediation • Posture detection: OS, apps, encryption • Workflow: notification, access, quarantine, wipe Multiple layers of security requirements: • Email access and attachments Identity • Apps and docs • AD/LDAP integration (group, OU, user) • BYOD data separation and privacy • On-board or external certificate authority • Rogue app access • Secure multi-user with fast switching • Compromised devices Baseline security and configuration • Lost devices • Lock, wipe, password, secure Wi-Fi/VPN … without damaging user experience 15
  • 16. MobileIron architecture: Real-world scale Components Operational scale (on-premise and cloud) • 100,000 devices per appliance • 20,000 registrations per hour • Biggest single certs site: 150,000 certs deployed Apps scale (App Delivery Network) • No limit on app size • No impact on corporate network • Fast download performance for user Low total cost of ownership • Easy installs and upgrades • No DBA, Windows patching, server licenses Large enterprise requirements: • 1 FTE can manage 10,000 to 20,000 devices • Deploy 100,000+ devices • Deploy 100MB+ sized apps Scale testing • Deploy 100,000+ certificates • TRUST – Test Reliability Under STress – • Manage with low total cost of ownership automation system – unique in industry • MDM/MAM loads of 100,000+ devices 16
  • 17. MobileIron investment in customer success World-class global technical support and services Domain expertise around mobility best practices Training and Best practice Evaluation Peer certification toolkits companion community BYOD, Apps, Android, Large Deployments Prepare Develop Roll out Sustain 17
  • 18. What customers are saying … MobileIron provides As the Director of Information Technology, I have been working with great support and technology solutions providers and their associated vendor support actually listens to personnel for many years. Ms. B’s knowledge, professionalism, customer feedback. client relationship skills, and mentoring capabilities far surpassed the abilities of the technical representatives from other vendors. My staff and I were extremely impressed with Ms. B’s performance This is hands-down the most and believe that her capabilities and those of her team help comprehensive set of BYOD distinguish the MobileIron solutions from the competition. documentation I have seen from a single source to date. MobileIron University in general is just awesome— The MobileIron team is extremely responsive to it's been an incredible customer needs. I have seen the platform resource for me growing from Beta all the way to become a I learned more leader in the Gartner Quadrant. That happens during the sessions because MobileIron listens to its customers. than I did during the last 6 months running our mobility project In this day and age of bad customer service, my experience with MobileIron has been consistently great and this last request for help was the best yet. 18
  • 19. Companies are building a new Mobile IT stack Identity Credentials SSO Persona Content Distribution Data Authoring (content hub) security Collaboration Apps Distribution Data App dev (app store) security Security & mgmt Global mgmt Security Access Network services Voice Data Wi-Fi VPN CDN 19
  • 20. MobileIron focus Identity Credentials SSO Persona Content Distribution Data Authoring (content hub) security Collaboration Apps Distribution Data App dev (app store) security Security & mgmt Global mgmt Security Access Network services Voice Data Wi-Fi VPN CDN 20
  • 21. Next set of Mobile IT challenges OS turbulence is the norm: Must support 3+ OS Boundaries blur: Content vs. app, mobile vs. desktop Shadow IT explodes for apps: Innovation or chaos? “I am my own CIO”: Help-yourself-desk Identity becomes strategic: Glue for mobile enterprise 21