SlideShare uma empresa Scribd logo
1 de 48
Embracing BYOD Trend Without
Compromising Security, Employee
Privacy, or the Mobile Experience
Shanmugarajah (Shan)
Director Architecture, Enterprise Mobility
WSO2 Inc.
Agen
da• Work- New definition
• Enterprise Mobility Challenges
• Different Approaches to Data
Security
• BYOD
• WSO2 EMM
• Summary
16 years
back
Employ
ees
Enterp
rise
Da
ta
Devi
ce
Devi
ce
Wo
rk• Happens inside a place
• Dependent on specific
Technology
• Resources
Within the premise
Owned by
enterprise
No
w
Thanks to
technology
Enterp
rise
Data
Employ
Devi
ce
Data Wo
rk• Independent of place
•Independent of Technology
•Resources
Within the premise and
outside
Owned by enterprise
and employees
Enterprise
Mobility ?
• New trend towards a shift in
work habits.
• Employees working out of
the office with Mobile
devices and cloud services
to perform business tasks.
Enterprise
Mobility
Challen
ges
Allow Mobility in your
organization ?
Enterp
rise
Dat
a
Employ
ees
Devi
ce
CO BY
Public
Store
• Data Security
• Remote Device Management
• Enterprise Store
• Enterprise Application Development
& Management
Challenges
Data Security
How the data can be
compromised ?
Device being lost or
stolen
Malicious App stealing
the data
Data Leak
What is the data ?
• Email message or the
attachment
• Documents like
pdf,word,excel,ppt,text
• Browser accessing HTML
pages,cookies
• Contact,Calendar,Notes
• Application with Database
Why the data is sensitive ?
• It can be highly confidential
like quotation value, salary
details
• It can have a high impact if it
Who can
compromise ?
External
Internal
Enterprise needs some kind
of Tool to solve the
enterprise Mobility challengeEM
M
Data Security -
Approach 1
Mobile Device
Management
• Enforce password policy on the
device
• Encrypt data when locked (AES
256 FIPS 140-2)
• Enterprise Data WIPE & Device
WIPE
• iCloud Backup Disable
How MDM can solve this
challenge ?
• If the password is compromised
• Malware or malicious app stealing
data
Data Security - Approach 1
- MDM
Drawba
cks
Vendor
Apps
Enterprise
Apps
Apps from Public
Store
Apps in the
Device Challenge
1.Need to separate
enterprise apps and
data
2.Able to Control it
3.Limit interaction with
personal apps and data.
Data Security - Approach 2 -
Separate Apps and Data
Within
Device
Away from
Device
Away from Device
•Desktop Virtualization or VDI technology (Citrix
XenDesktop,VMWare Horizon View, Dell
vWorkspace, Remote Desktop Microsoft.
•Web Apps
Within Device
• Virtualized OS’s on the mobile device
Data Security - Approach 2 -
Separate Apps and Data
Dual persona, two separate and independent end user
environments in a single device.
Mobile Virtualization
Virtualized OS’s on mobile
(Hypervisor 1 and 2)
BlackBerry
Balance
Samsung
KNOX
Other Dual
Persona’s
Blackberry
Z10
Samsung
Note 3
KNOX
Not all the devices support dual persona
iOS does not support or Apple will not
allow to modify the OS
• Desktop virtualization
• Web apps
• Mobile virtualization
Each one of those options has
its flaws.
Data Security -
Approach 3Mobile App
Management
• MAM gets you a step closer
to managing what you care
about
• MAM brings the perimeter
closer to the corporate
resources
Mobile App
Management (MAM)1. MAM (Controlling App behavior)
1a. SDK Approach
1b. App wrapping
2. OS MAM - iOS MAM through MDM
3. App Store and Managing apps with MDM
Data security
features1.Encrypt the data at transmit use app VPN tunnel
or app tunnel
2.Encrypt the data at rest & decrypt only when
viewing
3.Two factor authentication
4.Data Loss prevention (Disable Cut,Copy and
Paste)
5.Data at rest should be controlled (Delete)
6.Policy based Data control , where policy can be
pushed and updated
MAM controlling
apps behavior
Additional Features
1.Enterprise Apps in the mobile should be able to use
SSO
2.Data can be shared between application
MAM SDK
ApproachSDK contains all the necessary API to implement
the MAM features
Provides enterprise-grade security with user
authentication, single sign on, copy/paste
prevention, data encryption, app-level policies,
compliance monitoring and management.
MAM - App
Wrapping App
Wrapper
Tool
• For apps already built
• Need unsigned app binary.
• Not to apps from public app stores.
• Can do basics of encryption, authentication, or
app-level VPNs.
• Can intercept, block, or spoof API calls made
MAM Solution (Controlling app behavior)
•Works across all versions of Android and iOS
•Native apps provide a superior user
experience.
Remote desktops, web apps, and virtualized
mobile devices each have their place in the
EMM world, but MAM has distinct advantages.
Data Security - Best
Approach
• Remote Device Management
(MDM)
• Enterprise Store
• Enterprise Application Development
& Management
(MEAP, mBaas)
Other Challenges in
Enterprise
Embracing BYOD in
Enterprise - Benefits
• Cost
• Device
Maintenance
• Improved
Productivity
User-Experience and
Privacy in BYOD
More than one Enterprise Apps
Every app needs login
Desktop apps have SSO
Why not give the same experience
Native App
Monitor the personal data like contact
info, app info
User-
Experience
Priva
cy
WSO2 Enterprise Mobility
Manager
WSO2 EMM
WSO2 EMM
WSO2 EMM
Features
• MDM
• Enterprise Store with
Publisher
• Mobile App Management
Mobile Device
Management• Employee / CorporateOwned
• Supports Android, iOS
• Identity integration
• Policy Management
• Containerization (Email)
• Self Service Provisioning
• Role Based Permission
• End-User MDM Console
• Enterprise Wipe
• Reports & Analytics
Configuration
Android
Features
• Device Lock
• User password protectedWIPE
• Clear Password
• Send Message
• Wi-Fi
• Camera
• Encrypt Storage
• Mute
• Password Policy
• Change Lock Code
• App Blacklisting
• Location
• BatteryInformation
• MemoryInformation
• OperatorInformation
• Root Detection
• ApplicationInformation
Informati
on
iOSFeatures
• Device Lock
• Clear Passcode
• Wi-Fi
• Camera
• VPN
• APN
• Email
• Calendar
• LDAP
• Black - ListingApps
• EnterpriseWIPE
• PasswordPolicy
• BatteryInformation
• MemoryInformation
• ApplicationInformation
Configuration
Informati
on
WSO2 EMM
Screens
• Supports multiple platforms
• Android
• Native, Hybrid Application (.apk)
• Web Application
• Market Place Application (Google Play) [Free]
• iOS (iPhone, iPad)
• Native, Hybrid Application (.ipa) - Need to haveenterprise developer account
• Web Application
• Apple Store Application [Free]
• VPP Application (Next Release)
Publisher
WSO2 EMM –
Publisher
Store
Supports multiple platforms
User subscription
Advanced search options
App sorting
Support for existing user stores (Widgets,
Gadgets, Books, Magazines , APIs).
Single-Sign on
WSO2 EMM
– Store
Application Management
Console
• Mobile app policy
enforcement
• Compliance
monitoring
• Bulk app push
• User App
Management
• Tracking app
WSO2 EMM – App
Management
Enterpri
se
Data
CO
PE
BYO
D
Public
Store
Mobile Project
Management
Mobile Project
Management
Unified Store
Backend API,
mBaaS API
Unified Store
Backend API,
mBaaS API
Development
IDE
Development
IDE
MDMMDMME
AP
Big
Picture
Roadma
p• App Containerization (SDKApproach)
• Samsung KNOX Integration
• Dynamic Policy
• mBaaS
• MEAP
Summ
ary
• Different approaches to BYOD problem
• Based on your requirement
Can be MAM , or it can be hybrid
(MDM & MAM)
• End-user experience and their privacy is
important
Consumerization is a two-way
street.
You need to make sure your
users understand the need to
keep resources safe, but you
also need to make corporate
resources accessible.
IT
Consumeriz
ation
Q/
A
Thank
you

Mais conteúdo relacionado

Mais procurados

Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Thomas Godsted Rysgaard
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their DesksGen-i
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 

Mais procurados (19)

Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Making Mobile Manageable
Making Mobile Manageable Making Mobile Manageable
Making Mobile Manageable
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their Desks
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 

Semelhante a WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Datakidozen
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)kidozen
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Datakidozen
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Bring Your Legacy Applications to the Mobile World - DOAG 2014
Bring Your Legacy Applications to the Mobile World - DOAG 2014Bring Your Legacy Applications to the Mobile World - DOAG 2014
Bring Your Legacy Applications to the Mobile World - DOAG 2014AuraPlayer
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10MVP Dagen
 

Semelhante a WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience (20)

Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and BeyondWSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Managing BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise DataManaging BYOD Conference: Mobile Enterprise Data
Managing BYOD Conference: Mobile Enterprise Data
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)From MDM(Devices) to MDM(Data)
From MDM(Devices) to MDM(Data)
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
From Managing Devices to Apps to Data
From Managing Devices to Apps to DataFrom Managing Devices to Apps to Data
From Managing Devices to Apps to Data
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Bring Your Legacy Applications to the Mobile World - DOAG 2014
Bring Your Legacy Applications to the Mobile World - DOAG 2014Bring Your Legacy Applications to the Mobile World - DOAG 2014
Bring Your Legacy Applications to the Mobile World - DOAG 2014
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
 

Mais de WSO2

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in ChoreoWSO2
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023WSO2
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfWSO2
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in MinutesWSO2
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 

Mais de WSO2 (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience

  • 1. Embracing BYOD Trend Without Compromising Security, Employee Privacy, or the Mobile Experience Shanmugarajah (Shan) Director Architecture, Enterprise Mobility WSO2 Inc.
  • 2. Agen da• Work- New definition • Enterprise Mobility Challenges • Different Approaches to Data Security • BYOD • WSO2 EMM • Summary
  • 4. Employ ees Enterp rise Da ta Devi ce Devi ce Wo rk• Happens inside a place • Dependent on specific Technology • Resources Within the premise Owned by enterprise
  • 6. Enterp rise Data Employ Devi ce Data Wo rk• Independent of place •Independent of Technology •Resources Within the premise and outside Owned by enterprise and employees
  • 8. • New trend towards a shift in work habits. • Employees working out of the office with Mobile devices and cloud services to perform business tasks. Enterprise Mobility
  • 9. Challen ges Allow Mobility in your organization ?
  • 11. • Data Security • Remote Device Management • Enterprise Store • Enterprise Application Development & Management Challenges
  • 12. Data Security How the data can be compromised ? Device being lost or stolen Malicious App stealing the data Data Leak What is the data ? • Email message or the attachment • Documents like pdf,word,excel,ppt,text • Browser accessing HTML pages,cookies • Contact,Calendar,Notes • Application with Database Why the data is sensitive ? • It can be highly confidential like quotation value, salary details • It can have a high impact if it Who can compromise ? External Internal
  • 13. Enterprise needs some kind of Tool to solve the enterprise Mobility challengeEM M
  • 14. Data Security - Approach 1 Mobile Device Management
  • 15. • Enforce password policy on the device • Encrypt data when locked (AES 256 FIPS 140-2) • Enterprise Data WIPE & Device WIPE • iCloud Backup Disable How MDM can solve this challenge ? • If the password is compromised • Malware or malicious app stealing data Data Security - Approach 1 - MDM Drawba cks
  • 16. Vendor Apps Enterprise Apps Apps from Public Store Apps in the Device Challenge 1.Need to separate enterprise apps and data 2.Able to Control it 3.Limit interaction with personal apps and data.
  • 17. Data Security - Approach 2 - Separate Apps and Data Within Device Away from Device
  • 18. Away from Device •Desktop Virtualization or VDI technology (Citrix XenDesktop,VMWare Horizon View, Dell vWorkspace, Remote Desktop Microsoft. •Web Apps Within Device • Virtualized OS’s on the mobile device Data Security - Approach 2 - Separate Apps and Data
  • 19. Dual persona, two separate and independent end user environments in a single device. Mobile Virtualization Virtualized OS’s on mobile (Hypervisor 1 and 2) BlackBerry Balance Samsung KNOX
  • 21. Not all the devices support dual persona iOS does not support or Apple will not allow to modify the OS • Desktop virtualization • Web apps • Mobile virtualization Each one of those options has its flaws.
  • 22. Data Security - Approach 3Mobile App Management • MAM gets you a step closer to managing what you care about • MAM brings the perimeter closer to the corporate resources
  • 23. Mobile App Management (MAM)1. MAM (Controlling App behavior) 1a. SDK Approach 1b. App wrapping 2. OS MAM - iOS MAM through MDM 3. App Store and Managing apps with MDM
  • 24. Data security features1.Encrypt the data at transmit use app VPN tunnel or app tunnel 2.Encrypt the data at rest & decrypt only when viewing 3.Two factor authentication 4.Data Loss prevention (Disable Cut,Copy and Paste) 5.Data at rest should be controlled (Delete) 6.Policy based Data control , where policy can be pushed and updated MAM controlling apps behavior Additional Features 1.Enterprise Apps in the mobile should be able to use SSO 2.Data can be shared between application
  • 25. MAM SDK ApproachSDK contains all the necessary API to implement the MAM features Provides enterprise-grade security with user authentication, single sign on, copy/paste prevention, data encryption, app-level policies, compliance monitoring and management.
  • 26. MAM - App Wrapping App Wrapper Tool • For apps already built • Need unsigned app binary. • Not to apps from public app stores. • Can do basics of encryption, authentication, or app-level VPNs. • Can intercept, block, or spoof API calls made
  • 27. MAM Solution (Controlling app behavior) •Works across all versions of Android and iOS •Native apps provide a superior user experience. Remote desktops, web apps, and virtualized mobile devices each have their place in the EMM world, but MAM has distinct advantages. Data Security - Best Approach
  • 28. • Remote Device Management (MDM) • Enterprise Store • Enterprise Application Development & Management (MEAP, mBaas) Other Challenges in Enterprise
  • 29. Embracing BYOD in Enterprise - Benefits • Cost • Device Maintenance • Improved Productivity
  • 30. User-Experience and Privacy in BYOD More than one Enterprise Apps Every app needs login Desktop apps have SSO Why not give the same experience Native App Monitor the personal data like contact info, app info User- Experience Priva cy
  • 32. WSO2 EMM Features • MDM • Enterprise Store with Publisher • Mobile App Management
  • 33. Mobile Device Management• Employee / CorporateOwned • Supports Android, iOS • Identity integration • Policy Management • Containerization (Email) • Self Service Provisioning • Role Based Permission • End-User MDM Console • Enterprise Wipe • Reports & Analytics
  • 34. Configuration Android Features • Device Lock • User password protectedWIPE • Clear Password • Send Message • Wi-Fi • Camera • Encrypt Storage • Mute • Password Policy • Change Lock Code • App Blacklisting • Location • BatteryInformation • MemoryInformation • OperatorInformation • Root Detection • ApplicationInformation Informati on
  • 35. iOSFeatures • Device Lock • Clear Passcode • Wi-Fi • Camera • VPN • APN • Email • Calendar • LDAP • Black - ListingApps • EnterpriseWIPE • PasswordPolicy • BatteryInformation • MemoryInformation • ApplicationInformation Configuration Informati on
  • 37. • Supports multiple platforms • Android • Native, Hybrid Application (.apk) • Web Application • Market Place Application (Google Play) [Free] • iOS (iPhone, iPad) • Native, Hybrid Application (.ipa) - Need to haveenterprise developer account • Web Application • Apple Store Application [Free] • VPP Application (Next Release) Publisher
  • 39. Store Supports multiple platforms User subscription Advanced search options App sorting Support for existing user stores (Widgets, Gadgets, Books, Magazines , APIs). Single-Sign on
  • 41. Application Management Console • Mobile app policy enforcement • Compliance monitoring • Bulk app push • User App Management • Tracking app
  • 42. WSO2 EMM – App Management
  • 43. Enterpri se Data CO PE BYO D Public Store Mobile Project Management Mobile Project Management Unified Store Backend API, mBaaS API Unified Store Backend API, mBaaS API Development IDE Development IDE MDMMDMME AP Big Picture
  • 44. Roadma p• App Containerization (SDKApproach) • Samsung KNOX Integration • Dynamic Policy • mBaaS • MEAP
  • 45. Summ ary • Different approaches to BYOD problem • Based on your requirement Can be MAM , or it can be hybrid (MDM & MAM) • End-user experience and their privacy is important
  • 46. Consumerization is a two-way street. You need to make sure your users understand the need to keep resources safe, but you also need to make corporate resources accessible. IT Consumeriz ation
  • 47. Q/ A