SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
Embracing BYOD Trend Without
Compromising Security, Employee
Privacy, or the Mobile Experience!
Shanmugarajah (Shan)
Director Architecture, Enterprise Mobility
WSO2 Inc.!
Agen
da	
  •  Work- New definition
•  Enterprise Mobility Challenges
•  Different Approaches to Data
Security
•  BYOD
•  WSO2 EMM
•  Summary	
  
16 years
back	
  
Employ
ees	
  
Enterp
rise	
  
Da
ta	
  
Devi
ce	
  
Devi
ce	
  
Wo
rk	
  
• Happens inside a place
• Dependent on specific
Technology
• Resources
Within the premise
Owned by
enterprise
No
w	
  
Thanks to
technology 	
  
Enterp
rise	
  
Data	
  
Employ
Devi
ce	
  
Data	
   Wo
rk	
  
•  Independent of place
• Independent of Technology
• Resources
Within the premise and
outside
Owned by enterprise
and employees
Enterprise
Mobility ? 	
  
•  New trend towards a shift in
work habits.
•  Employees working out of
the office with Mobile
devices and cloud services
to perform business tasks.	
  
Enterprise
Mobility 	
  
Challen
ges	
  
Allow Mobility in your
organization ?	
  
Enterp
rise	
  
Dat
a	
  
Employ
ees	
  
Devi
ce	
  
CO BY
Public
Store	
  
•  Data Security
•  Remote Device Management
•  Enterprise Store
•  Enterprise Application Development
& Management	
  
Challenges	
  
Data Security	
  
How the data can be
compromised ?
Device being lost or
stolen
Malicious App stealing
the data
Data Leak	
  
What is the data ?
•  Email message or the
attachment
•  Documents like
pdf,word,excel,ppt,text
•  Browser accessing HTML
pages,cookies
•  Contact,Calendar,Notes
•  Application with Database 	
  
Why the data is sensitive ?
• It can be highly confidential
like quotation value, salary
details
• It can have a high impact if it
Who can
compromise ?
External
Internal	
  
Enterprise needs some kind
of Tool to solve the
enterprise Mobility challenge!
EM
M	
  
Data Security -
Approach 1	
  
Mobile Device
Management	
  
•  Enforce password policy on the
device
•  Encrypt data when locked (AES
256 FIPS 140-2)
•  Enterprise Data WIPE & Device
WIPE
•  iCloud Backup Disable	
  
How MDM can solve this
challenge ?	
  
•  If the password is compromised
•  Malware or malicious app stealing
data
Data Security - Approach 1
- MDM	
  
Drawba
cks	
  
Vendor
Apps	
  
Enterprise
Apps	
  
Apps from Public
Store	
  
Apps in the
Device 	
   Challenge
1.Need to separate
enterprise apps and
data
2.Able to Control it
3.Limit interaction with
personal apps and data.	
  
Data Security - Approach 2 -
Separate Apps and Data	
  
Within
Device	
  
Away from
Device	
  
Away from Device
• Desktop Virtualization or VDI technology (Citrix
XenDesktop,VMWare Horizon View, Dell
vWorkspace, Remote Desktop Microsoft.
• Web Apps
Within Device
•  Virtualized OS’s on the mobile device
Data Security - Approach 2 -
Separate Apps and Data	
  
Dual persona, two separate and independent end user
environments in a single device.	
  
Mobile Virtualization
Virtualized OS’s on mobile
(Hypervisor 1 and 2)	
  
BlackBerry
Balance
Samsung
KNOX	
  
Other Dual
Persona’s	
  
Blackberry
Z10	
  
Samsung
Note 3	
  
KNOX
Not all the devices support dual persona
iOS does not support or Apple will not
allow to modify the OS 	
  
•  Desktop virtualization
•  Web apps
•  Mobile virtualization
Each one of those options has
its flaws. 	
  
Data Security -
Approach 3	
  
Mobile App
Management	
  
•  MAM gets you a step closer
to managing what you care
about
•  MAM brings the perimeter
closer to the corporate
resources	
  
Mobile App
Management (MAM)	
  1. MAM (Controlling App behavior)
1a. SDK Approach
1b. App wrapping
2. OS MAM - iOS MAM through MDM
3. App Store and Managing apps with MDM	
  
Data security
features	
  1. Encrypt the data at transmit use app VPN tunnel
or app tunnel
2. Encrypt the data at rest & decrypt only when
viewing
3. Two factor authentication
4. Data Loss prevention (Disable Cut,Copy and
Paste)
5. Data at rest should be controlled (Delete)
6. Policy based Data control , where policy can be
pushed and updated	
  
MAM controlling apps
behavior	
  
Additional Features
1. Enterprise Apps in the mobile should be able to use
SSO
2. Data can be shared between application
MAM SDK
Approach	
  
SDK contains all the necessary API to implement
the MAM features
Provides enterprise-grade security with user
authentication, single sign on, copy/paste
prevention, data encryption, app-level policies,
compliance monitoring and management.	
  
MAM - App
Wrapping	
  
App
Wrapper
Tool	
  
•  For apps already built
•  Need unsigned app binary.
•  Not to apps from public app stores.
•  Can do basics of encryption, authentication, or
app-level VPNs.
•  Can intercept, block, or spoof API calls made
MAM Solution (Controlling app behavior)
• Works across all versions of Android and iOS
• Native apps provide a superior user
experience.
Remote desktops, web apps, and virtualized
mobile devices each have their place in the
EMM world, but MAM has distinct advantages.	
  
Data Security - Best
Approach	
  
•  Remote Device Management
(MDM)
•  Enterprise Store
•  Enterprise Application Development
& Management
(MEAP, mBaas)	
  
Other Challenges in
Enterprise	
  
Embracing BYOD in
Enterprise - Benefits!
•  Cost
•  Device
Maintenance
•  Improved
Productivity!
User-Experience and
Privacy in BYOD!
More than one Enterprise Apps
Every app needs login
Desktop apps have SSO
Why not give the same experience
Native App!
Monitor the personal data like contact
info, app info
User-
Experience	
  
Priva
cy	
  
WSO2 Enterprise Mobility
Manager
WSO2 EMM!
WSO2 EMM
Features	
  
•  MDM
•  Enterprise Store with
Publisher
•  Mobile App Management	
  
Mobile Device
Management	
  •  Employee / CorporateOwned
•  Supports Android, iOS
•  Identity integration
•  Policy Management
•  Containerization (Email)
•  Self Service Provisioning
•  Role Based Permission
•  End-User MDM Console
•  Enterprise Wipe
•  Reports & Analytics	
  
Configuration	
  
Android
Features	
  
•  Device Lock
•  User password protectedWIPE
•  Clear Password
•  Send Message
•  Wi-Fi
•  Camera
•  Encrypt Storage
•  Mute
•  Password Policy
•  Change Lock Code
•  App Blacklisting	
  
•  Location
•  BatteryInformation
•  MemoryInformation
•  OperatorInformation
•  Root Detection
•  ApplicationInformation	
  
Informati
on	
  
iOSFeatures	
  
•  Device Lock
•  Clear Passcode
•  Wi-Fi
•  Camera
•  VPN
•  APN
•  Email
•  Calendar
•  LDAP
•  Black - ListingApps
•  EnterpriseWIPE
•  PasswordPolicy	
  
•  BatteryInformation
•  MemoryInformation
•  ApplicationInformation	
  
Configuration	
  
Informati
on	
  
WSO2 EMM
Screens	
  
•  Supports multiple platforms
•  Android
•  Native, Hybrid Application (.apk)
•  Web Application
•  Market Place Application (Google Play) [Free]
•  iOS (iPhone, iPad)
•  Native, Hybrid Application (.ipa) - Need to haveenterprise developer account
•  Web Application
•  Apple Store Application [Free]
•  VPP Application (Next Release)	
  
Publisher	
  	
  
WSO2 EMM –
Publisher	
  
Store	
  	
  
Supports multiple platforms
User subscription
Advanced search options
App sorting
Support for existing user stores (Widgets,
Gadgets, Books, Magazines , APIs).
Single-Sign on	
  
WSO2 EMM
– Store	
  
Application Management
Console	
  
•  Mobile app policy
enforcement
•  Compliance
monitoring
•  Bulk app push
•  User App
Management
•  Tracking app
WSO2 EMM – App
Management 	
  
Enterpri
se	
  
Data	
  
CO
PE	
  
BYO
D	
  
Public
Store	
  
Mobile Project
Management	
  
Unified Store
Backend API,
mBaaS API	
  
Development
IDE	
  
MDM	
  ME
AP	
  
Big
Picture	
  
Roadma
p	
  •  App Containerization (SDKApproach)
•  Samsung KNOX Integration
•  Dynamic Policy
•  mBaaS
•  MEAP 	
  
Summ
ary	
  
• Different approaches to BYOD problem
• Based on your requirement
Can be MAM , or it can be hybrid
(MDM & MAM)
• End-user experience and their privacy is
important	
  
Consumerization is a two-way
street.
You need to make sure your
users understand the need to
keep resources safe, but you
also need to make corporate
resources accessible.!
IT
Consumeriz
ation	
  
Q/
A	
  
Thank
you	
  

Mais conteúdo relacionado

Mais procurados

Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
What iOS 9 Means for the Enterprise
What iOS 9 Means for the EnterpriseWhat iOS 9 Means for the Enterprise
What iOS 9 Means for the EnterpriseAlexander Romero
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3rajpsft
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOACA API Management
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
What Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseWhat Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseAlexander Romero
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overviewAjay Chebbi
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
Android for work makes your favourite smartphone or tablet the perfect busine...
Android for work makes your favourite smartphone or tablet the perfect busine...Android for work makes your favourite smartphone or tablet the perfect busine...
Android for work makes your favourite smartphone or tablet the perfect busine...Ketan Raval
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 

Mais procurados (20)

Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
What iOS 9 Means for the Enterprise
What iOS 9 Means for the EnterpriseWhat iOS 9 Means for the Enterprise
What iOS 9 Means for the Enterprise
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Prosoft mobile services v3
Prosoft mobile services v3Prosoft mobile services v3
Prosoft mobile services v3
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
What Android for Work Means for the Enterprise
What Android for Work Means for the EnterpriseWhat Android for Work Means for the Enterprise
What Android for Work Means for the Enterprise
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overview
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
Android for work makes your favourite smartphone or tablet the perfect busine...
Android for work makes your favourite smartphone or tablet the perfect busine...Android for work makes your favourite smartphone or tablet the perfect busine...
Android for work makes your favourite smartphone or tablet the perfect busine...
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 

Destaque

Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCA API Management
 
Restful design principles
Restful design principlesRestful design principles
Restful design principlesGeison Goes
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld
 
RESTful API development with Symfony2
RESTful API development with Symfony2RESTful API development with Symfony2
RESTful API development with Symfony2Taras Omelianenko
 
REST API Best Practices & Implementing in Codeigniter
REST API Best Practices & Implementing in CodeigniterREST API Best Practices & Implementing in Codeigniter
REST API Best Practices & Implementing in CodeigniterSachin G Kulkarni
 
RESTful API Design & Implementation with CodeIgniter PHP Framework
RESTful API Design & Implementation with CodeIgniter PHP FrameworkRESTful API Design & Implementation with CodeIgniter PHP Framework
RESTful API Design & Implementation with CodeIgniter PHP FrameworkBo-Yi Wu
 
Microservice Architecture JavaCro 2015
Microservice Architecture JavaCro 2015Microservice Architecture JavaCro 2015
Microservice Architecture JavaCro 2015Nenad Pecanac
 
DataPower Restful API Security
DataPower Restful API SecurityDataPower Restful API Security
DataPower Restful API SecurityJagadish Vemugunta
 
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entity
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entitySpring IO 2016 - Spring Cloud Microservices, a journey inside a financial entity
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entityToni Jara
 
Building REST APIs with Spring Boot and Spring Cloud
Building REST APIs with Spring Boot and Spring CloudBuilding REST APIs with Spring Boot and Spring Cloud
Building REST APIs with Spring Boot and Spring CloudKenny Bastani
 
Building a Reactive RESTful API with Akka Http & Slick
Building a Reactive RESTful API with Akka Http & SlickBuilding a Reactive RESTful API with Akka Http & Slick
Building a Reactive RESTful API with Akka Http & SlickZalando Technology
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectJonathan LeBlanc
 
RESTful API and ASP.NET
RESTful API and ASP.NETRESTful API and ASP.NET
RESTful API and ASP.NETDelphiCon
 
REST and Microservices
REST and MicroservicesREST and Microservices
REST and MicroservicesShaun Abram
 
Rest API Security
Rest API SecurityRest API Security
Rest API SecurityStormpath
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
MicroService Architecture
MicroService ArchitectureMicroService Architecture
MicroService ArchitectureFred George
 

Destaque (20)

Cross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San FranciscoCross Platform Mobile Apps with APIs from Qcon San Francisco
Cross Platform Mobile Apps with APIs from Qcon San Francisco
 
Restful design principles
Restful design principlesRestful design principles
Restful design principles
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
RESTful API development with Symfony2
RESTful API development with Symfony2RESTful API development with Symfony2
RESTful API development with Symfony2
 
REST API Best Practices & Implementing in Codeigniter
REST API Best Practices & Implementing in CodeigniterREST API Best Practices & Implementing in Codeigniter
REST API Best Practices & Implementing in Codeigniter
 
RESTful API Design & Implementation with CodeIgniter PHP Framework
RESTful API Design & Implementation with CodeIgniter PHP FrameworkRESTful API Design & Implementation with CodeIgniter PHP Framework
RESTful API Design & Implementation with CodeIgniter PHP Framework
 
Microservice Architecture JavaCro 2015
Microservice Architecture JavaCro 2015Microservice Architecture JavaCro 2015
Microservice Architecture JavaCro 2015
 
DataPower Restful API Security
DataPower Restful API SecurityDataPower Restful API Security
DataPower Restful API Security
 
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entity
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entitySpring IO 2016 - Spring Cloud Microservices, a journey inside a financial entity
Spring IO 2016 - Spring Cloud Microservices, a journey inside a financial entity
 
Building REST APIs with Spring Boot and Spring Cloud
Building REST APIs with Spring Boot and Spring CloudBuilding REST APIs with Spring Boot and Spring Cloud
Building REST APIs with Spring Boot and Spring Cloud
 
Building a Reactive RESTful API with Akka Http & Slick
Building a Reactive RESTful API with Akka Http & SlickBuilding a Reactive RESTful API with Akka Http & Slick
Building a Reactive RESTful API with Akka Http & Slick
 
Securing RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID ConnectSecuring RESTful APIs using OAuth 2 and OpenID Connect
Securing RESTful APIs using OAuth 2 and OpenID Connect
 
REST, RESTful API
REST, RESTful APIREST, RESTful API
REST, RESTful API
 
RESTful API and ASP.NET
RESTful API and ASP.NETRESTful API and ASP.NET
RESTful API and ASP.NET
 
REST and Microservices
REST and MicroservicesREST and Microservices
REST and Microservices
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
REST & RESTful Web Services
REST & RESTful Web ServicesREST & RESTful Web Services
REST & RESTful Web Services
 
MicroService Architecture
MicroService ArchitectureMicroService Architecture
MicroService Architecture
 
RESTful Web Services
RESTful Web ServicesRESTful Web Services
RESTful Web Services
 

Semelhante a Embracing BYOD Trend Without Compromising Security, Privacy or Experience

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)kidozen
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 

Semelhante a Embracing BYOD Trend Without Compromising Security, Privacy or Experience (20)

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 

Mais de WSO2

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in ChoreoWSO2
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023WSO2
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfWSO2
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in MinutesWSO2
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 

Mais de WSO2 (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 

Último

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Embracing BYOD Trend Without Compromising Security, Privacy or Experience

  • 1. Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience! Shanmugarajah (Shan) Director Architecture, Enterprise Mobility WSO2 Inc.!
  • 2. Agen da  •  Work- New definition •  Enterprise Mobility Challenges •  Different Approaches to Data Security •  BYOD •  WSO2 EMM •  Summary  
  • 4. Employ ees   Enterp rise   Da ta   Devi ce   Devi ce   Wo rk   • Happens inside a place • Dependent on specific Technology • Resources Within the premise Owned by enterprise
  • 6. Enterp rise   Data   Employ Devi ce   Data   Wo rk   •  Independent of place • Independent of Technology • Resources Within the premise and outside Owned by enterprise and employees
  • 8. •  New trend towards a shift in work habits. •  Employees working out of the office with Mobile devices and cloud services to perform business tasks.   Enterprise Mobility  
  • 9. Challen ges   Allow Mobility in your organization ?  
  • 10. Enterp rise   Dat a   Employ ees   Devi ce   CO BY Public Store  
  • 11. •  Data Security •  Remote Device Management •  Enterprise Store •  Enterprise Application Development & Management   Challenges  
  • 12. Data Security   How the data can be compromised ? Device being lost or stolen Malicious App stealing the data Data Leak   What is the data ? •  Email message or the attachment •  Documents like pdf,word,excel,ppt,text •  Browser accessing HTML pages,cookies •  Contact,Calendar,Notes •  Application with Database   Why the data is sensitive ? • It can be highly confidential like quotation value, salary details • It can have a high impact if it Who can compromise ? External Internal  
  • 13. Enterprise needs some kind of Tool to solve the enterprise Mobility challenge! EM M  
  • 14. Data Security - Approach 1   Mobile Device Management  
  • 15. •  Enforce password policy on the device •  Encrypt data when locked (AES 256 FIPS 140-2) •  Enterprise Data WIPE & Device WIPE •  iCloud Backup Disable   How MDM can solve this challenge ?   •  If the password is compromised •  Malware or malicious app stealing data Data Security - Approach 1 - MDM   Drawba cks  
  • 16. Vendor Apps   Enterprise Apps   Apps from Public Store   Apps in the Device   Challenge 1.Need to separate enterprise apps and data 2.Able to Control it 3.Limit interaction with personal apps and data.  
  • 17. Data Security - Approach 2 - Separate Apps and Data   Within Device   Away from Device  
  • 18. Away from Device • Desktop Virtualization or VDI technology (Citrix XenDesktop,VMWare Horizon View, Dell vWorkspace, Remote Desktop Microsoft. • Web Apps Within Device •  Virtualized OS’s on the mobile device Data Security - Approach 2 - Separate Apps and Data  
  • 19. Dual persona, two separate and independent end user environments in a single device.   Mobile Virtualization Virtualized OS’s on mobile (Hypervisor 1 and 2)   BlackBerry Balance Samsung KNOX  
  • 20. Other Dual Persona’s   Blackberry Z10   Samsung Note 3   KNOX
  • 21. Not all the devices support dual persona iOS does not support or Apple will not allow to modify the OS   •  Desktop virtualization •  Web apps •  Mobile virtualization Each one of those options has its flaws.  
  • 22. Data Security - Approach 3   Mobile App Management   •  MAM gets you a step closer to managing what you care about •  MAM brings the perimeter closer to the corporate resources  
  • 23. Mobile App Management (MAM)  1. MAM (Controlling App behavior) 1a. SDK Approach 1b. App wrapping 2. OS MAM - iOS MAM through MDM 3. App Store and Managing apps with MDM  
  • 24. Data security features  1. Encrypt the data at transmit use app VPN tunnel or app tunnel 2. Encrypt the data at rest & decrypt only when viewing 3. Two factor authentication 4. Data Loss prevention (Disable Cut,Copy and Paste) 5. Data at rest should be controlled (Delete) 6. Policy based Data control , where policy can be pushed and updated   MAM controlling apps behavior   Additional Features 1. Enterprise Apps in the mobile should be able to use SSO 2. Data can be shared between application
  • 25. MAM SDK Approach   SDK contains all the necessary API to implement the MAM features Provides enterprise-grade security with user authentication, single sign on, copy/paste prevention, data encryption, app-level policies, compliance monitoring and management.  
  • 26. MAM - App Wrapping   App Wrapper Tool   •  For apps already built •  Need unsigned app binary. •  Not to apps from public app stores. •  Can do basics of encryption, authentication, or app-level VPNs. •  Can intercept, block, or spoof API calls made
  • 27. MAM Solution (Controlling app behavior) • Works across all versions of Android and iOS • Native apps provide a superior user experience. Remote desktops, web apps, and virtualized mobile devices each have their place in the EMM world, but MAM has distinct advantages.   Data Security - Best Approach  
  • 28. •  Remote Device Management (MDM) •  Enterprise Store •  Enterprise Application Development & Management (MEAP, mBaas)   Other Challenges in Enterprise  
  • 29. Embracing BYOD in Enterprise - Benefits! •  Cost •  Device Maintenance •  Improved Productivity!
  • 30. User-Experience and Privacy in BYOD! More than one Enterprise Apps Every app needs login Desktop apps have SSO Why not give the same experience Native App! Monitor the personal data like contact info, app info User- Experience   Priva cy  
  • 32. WSO2 EMM Features   •  MDM •  Enterprise Store with Publisher •  Mobile App Management  
  • 33. Mobile Device Management  •  Employee / CorporateOwned •  Supports Android, iOS •  Identity integration •  Policy Management •  Containerization (Email) •  Self Service Provisioning •  Role Based Permission •  End-User MDM Console •  Enterprise Wipe •  Reports & Analytics  
  • 34. Configuration   Android Features   •  Device Lock •  User password protectedWIPE •  Clear Password •  Send Message •  Wi-Fi •  Camera •  Encrypt Storage •  Mute •  Password Policy •  Change Lock Code •  App Blacklisting   •  Location •  BatteryInformation •  MemoryInformation •  OperatorInformation •  Root Detection •  ApplicationInformation   Informati on  
  • 35. iOSFeatures   •  Device Lock •  Clear Passcode •  Wi-Fi •  Camera •  VPN •  APN •  Email •  Calendar •  LDAP •  Black - ListingApps •  EnterpriseWIPE •  PasswordPolicy   •  BatteryInformation •  MemoryInformation •  ApplicationInformation   Configuration   Informati on  
  • 37. •  Supports multiple platforms •  Android •  Native, Hybrid Application (.apk) •  Web Application •  Market Place Application (Google Play) [Free] •  iOS (iPhone, iPad) •  Native, Hybrid Application (.ipa) - Need to haveenterprise developer account •  Web Application •  Apple Store Application [Free] •  VPP Application (Next Release)   Publisher    
  • 39. Store     Supports multiple platforms User subscription Advanced search options App sorting Support for existing user stores (Widgets, Gadgets, Books, Magazines , APIs). Single-Sign on  
  • 41. Application Management Console   •  Mobile app policy enforcement •  Compliance monitoring •  Bulk app push •  User App Management •  Tracking app
  • 42. WSO2 EMM – App Management  
  • 43. Enterpri se   Data   CO PE   BYO D   Public Store   Mobile Project Management   Unified Store Backend API, mBaaS API   Development IDE   MDM  ME AP   Big Picture  
  • 44. Roadma p  •  App Containerization (SDKApproach) •  Samsung KNOX Integration •  Dynamic Policy •  mBaaS •  MEAP  
  • 45. Summ ary   • Different approaches to BYOD problem • Based on your requirement Can be MAM , or it can be hybrid (MDM & MAM) • End-user experience and their privacy is important  
  • 46. Consumerization is a two-way street. You need to make sure your users understand the need to keep resources safe, but you also need to make corporate resources accessible.! IT Consumeriz ation