Jesus Rodriguez, KidoZen
|
|
|
- Deborah Phelps
- 10 years ago
- Views:
Transcription
1 Jesus Rodriguez, KidoZen
2 About Me Hackerpreneur Co-Founder KidoZen, Inc Advisor to software companies(microsoft, Oracle.) Board member Speaker, Author Investor
3 Enterprise Mobile-First PaaS KidoZen App Center Storage APIs Security APIs Integration APIs Messaging APIs LOB Connector Services HTML5 Hosted Apps Your Datacenter
4 Customers
5 Agenda A quick story about mobile operations management From MDM(devices) to MDM(data) An effective model for managing and securing mobile business data We are not going to talk about KidoZen!
6 A quick story about mobile operations management
7 It Started When People Began Using their Smartphone for Work
8 And The Obvious IT Answer Was: Let s Manage the Device
9 Technologically Trivial.
10 And Yet So Necessary.
11 The Industry Exploded.
12 And Some Incumbents Got In the Game
13 We Are Passed The Hype.
14 Something to think about: The golden days of MDM are behind us.
15 What Happened Next?
16 Organizations Started Build Apps I want an app!
17 And Managing Devices Wasn t Enough
18 The Mobile App Management Space Emerged
19 And The MDM Vendors Started Getting into the Space.
20 Something to think about: MAM is becoming an extension/feature of MDM platforms
21 What Happened Next?
22 Organizations were Ready for the Next Level of Mobile Ops Management
23 Mobile Business Data Management
24 It Makes Perfect Sense Managing Devices Managing Apps Managing Business Data
25 And Yet There Is No Solution.
26 We Can Manage Files
27 But Not Business Data
28 Why Is That?
29 Enterprise mobile solutions are just reaching the necessary maturity level to enable the management and security of business data
30 Enterprise Mobile Maturity vs. Management Granularity
31 Mobile Solutions Market Maturity Mobile Ops Management Granularity
32 Mobile connectivity to line of business systems remains a challenge for most organizations
33 Something to think about: An enterprise mobile middleware is required to enable the management and security of mobile business data
34 A simple management and access control model for your mobile business data
35 The DNA of Mobile Business Data Access Access Model Mobile App-to-LOB real time access (in-transit) LOB-Mobile App event based access (in-transit) Mobile data cached in the cloud (at rest) Mobile business data cached in the device (at rest) Mobile business data in the app (in use) Contextual Network, Carrier Location Access Frequency Device Mobile-First Data Source Small data sets Secured
36 How to manage my mobile business data?
37 Mobile Business Data Management Managing Business Data In-Transit Managing Business Data At-Rest Managing Business Data In-Use
38 Managing Mobile Business Data In-Transit
39 Mobile Business Data Management = Mobile Data Sources + Context-aware-mobile-first policies
40 A Mobile Data Sources is the unit of data accessed by your enterprise mobile apps
41 A Mobile Data Management Architecture Model 1-Mobile app invokes a data access API to request Access to the corporate data source 6-The mobile app can Data Source API (mobile middleware) 4- If the request is compliant with the mobile data access policies, the API call to the business data source is executed 5-The results of the data access operation are produced Enterprise Data Source 2-The request is evaluated against multiple mobile data management policies 3- The result from the mobile data access policies is produced Mobile Data Access Control Engine
42 Context-Aware Mobile-First Data-Policies Geo-location based policies Device based policies App based polices Network based policies Mobile client based policies
43 Geo-location Based Mobile Business Data Policies SAP Accounts Require dual factor challenge if accessed outside North America
44 Device-Based Mobile Business Data Policies SalesForce.com Leads No accessed from a jail broken iphone
45 Network-Based Mobile Business Data Policies Siebel Opportunities Require encryption when accessed from an AT&T network
46 App-Based Mobile Business Data Policies Oracle EBS Orders Can be accessed by the top order application Require dual factor challenge if accessed from any other app
47 Compliance Mobile Business Data Policies EPIC Patient Records Require HIPAA compliance communication and can t be accessed from Windows Phone devices
48 People Based Mobile Business Data Management Policies SharePoint Content Can t be accessed from people in the HR department (AD role)
49 Managing Mobile Data At-Rest
50 At-Rest Mobile Data Management Secure Mobile Offline Storage Secure SQLLite Encrypt and sign at-rest mobile business data Offline Mobile Data Management Policies Offline data expiration policies Key lifetime policies
51 Managing Mobile Data In-Use
52 In-Use Mobile Data Management Secure Mobile Data In-Use Encrypt and sign In-Memory data In-Memory Mobile Data Management Policies In-Memory data expiration policies Key lifetime policies
53 Imagine if We could extend our enterprise mobile app store with the data sources your mobile apps are using!
54 Mobile Device Management Policies Mobile Application Management Policies Mobile Data Management Policies Mobile Operations Access Control Pipeline
55 If you had that type of mobile data management solution.
56 How Much Would you Really Care About Devices and Apps Managing Devices Managing Apps Managing Business Data
57 Something to think about: Effectively managing your mobile business data is the ultimate goal of a mobile operations infrastructure
58 Summary Enterprise mobile operations management has evolved from the management of devices to apps to data Mobile business data management is the crown jewel of enterprise mobile management Mobile business data management is about applying context-aware-mobile-first policies to mobile data sources An enterprise mobile middleware infrastructure is required to effectively manage your mobile business data
59 Thanks
Integration in the Enterprise Mobile World
Integration in the Enterprise Mobile World Hackerpreneur Co-Founder KidoZen, Inc Co-Founder Tellago, Inc Advisor to software companies(microsoft, Oracle.) Board member, Investor Speaker, Author http://weblogs.asp.net/gsusx
Introducing KidoZen: the next-generation, integrated mobile app platform
Introducing KidoZen: the next-generation, integrated mobile app platform Most CIOs believe mobility will impact their businesses as much as or more than the Internet did in the 1990s 1. It s no wonder
Enterprise Mobility Space
MBaaS How MBaaS is Shaping up the Enterprise Mobility Space A RapidValue Solutions Whitepaper Contents Executive Summary... What is Mobile Backend as a Service (MBaaS)?... Primary Building Blocks of MBaaS...
Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01
Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Cloud Services for DevOps: Next-gen PaaS Through MBaaS
Cloud Services for DevOps: Next-gen PaaS Through MBaaS September 2013 Presented by: Brad Shimmin Research Director, Business Technology and Software [email protected] Charlotte Dunlap Sr. Analyst,
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
From SOA to MOA: Transitioning from Service to Mobile Oriented Architectures
From SOA to MOA: Transitioning from Service to Mobile Oriented Architectures OVERVIEW The evolution of enterprise mobility has brought with it new challenges to organizations attempting to enable the right
Mobile Device and Application Strategy. Right Technology, Right Design, Right Price
Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy
BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012
BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.
SAP HANA Cloud Portal Overview and Scenarios
SAP HANA Cloud Portal Overview and Scenarios HERUG 2014 Conference - Montevideo April 2014 Twitter: @portal_sap / #hanacloudportal HERUG 2014 Conference Event Website Event overview Information and Agenda
Agenda. Company Platform Customers Partners Competitive Analysis
KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
White paper. Planning for SaaS Integration
White paper Planning for SaaS Integration KEY PLANNING CONSIDERATIONS: Business Process Modeling Data Moderling and Mapping Data Ownership Integration Strategy Security Quality of Data (Data Cleansing)
Enterprise Mobility Best Practices 2017 Analysts Predictions
Enterprise Mobility Best Practices 2017 Analysts Predictions Sponsored by Fiberlink John Jackson February, 2014 Agenda 1. Enterprise Mobility, the Third Platform, and a 2-3 Year Outlook 2. Mobile Enterprise
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION
POINT-TO-POINT vs. MEAP THE RIGHT APPROACH FOR AN INTEGRATED MOBILITY SOLUTION Executive Summary Enterprise mobility has transformed the way businesses engage with customers, partners and staff while exchanging
<Insert Picture Here> Achieving Business & Government Interoperability through PaaS & SaaS
Achieving Business & Government Interoperability through PaaS & SaaS Dr. Constantine Steriadis, [email protected] FMW Sales Consulting Manager, Oracle Hellas SA Agenda
How To Store Data On A Server Or Hard Drive (For A Cloud)
Introducing 365 Cloud Storage Local Enterprise Cloud Storage SERVICE AVAILABILITY: SEPTEMBER 23, 2014 What we do 365 Data Centers provides secure and reliable colocation services that offer an easier way
Agentless Cloud Backup and Recovery Software for the Enterprise
Recovery is Everything Agentless Cloud Backup and Recovery Software for the Enterprise T: 020 7749 0800 E: [email protected] W: www.datrix.co.uk Your company s single most valuable asset may be its data.
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
Data Relationship Management It s Not Just for Hierarchies. Todd Rebner, Managing Partner
Data Relationship Management It s Not Just for Hierarchies Presented by: Todd Rebner, Managing Partner Agenda Data Relationship Management Overview Data Governance DRM Functionality : General & Advanced
ENTERPRISE MOBILITY Strategy and Execution Approach. A RapidValue Solutions Whitepaper. RapidValue Solutions
ENTERPRISE MOBILITY Strategy and Execution Approach A RapidValue Solutions Whitepaper Contents Driver s of Enterprise Mobility 04 Current Landscape Mobile 1.0 Mobile 2.0 Mobile 3.0 Why do we need mobile
Oracle Applications and Cloud Computing - Future Direction
Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy [email protected] Vijay Tirumalai [email protected]
MDM Registry Pros and Cons
Global Data Competency Adam J. White President MDM Registry Pros and Cons August 24, 2009 Agenda Fundamental MDM Implementation Styles PROS and CONS of Registry Style Determining MDM Style to Implement
Copyright 2014 Oracle and/or its affiliates. All rights reserved.
How Hitachi Consulting Standardized Globally on Oracle Sales Cloud Chris Buri Vice President & CIO (Hitachi Consulting) Dave Sheridan Vice President, Global Oracle CX Practice Leader (Hitachi Consulting)
Building Cross Platform Mobile Apps Dev Tools, MBaaS, Architecture, APIs
Building Cross Platform Mobile Apps Dev Tools, MBaaS, Architecture, APIs So You Want to Build a Mobile App What Mobile Platforms to Support? What backend services to integrate? What login credentials are
How To Protect Your Data From Harm
Brochure: Comprehensive Agentless Backup and Recovery Software for the Enterprise Comprehensive Agentless Backup and Recovery Software for the Enterprise BROCHURE Your company s single most valuable asset
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Backing up to the Cloud
Backing up to the Cloud Practical Considerations Chander Kant CEO Zmanda, Inc. 1 Zmanda Worldwide Leader in Open Source Backup 500,000+ Protected Systems Open Source. Open APIs. Open Formats. Smashes traditional
May 14 th, 2015 INTRODUCING WATCHDOX. And The ABC s Of Secure File Sharing. Jeff Holleran VP Corporate Strategy BlackBerry
INTRODUCING WATCHDOX And The ABC s Of Secure File Sharing May 14 th, 2015 May 14 th, Jeff Holleran VP Corporate Strategy BlackBerry 2015 Tim Choi VP Product Management and Product Marketing WatchDox Introduction
AtriaCapture using Asigra
AtriaCapture using Asigra Your company s single most valuable asset may be its data Customer data, product data, financial data, employee data this is the lifeblood of modern organisations. And when something
The BYOD security Battleground
The BYOD security Battleground www.watchfulsoftware.com October, 21 st 2015 Agenda - INTRODUCTIONS & HOUSE RULES - BYOD AND ITS IMPACT ON THE ENTERPRISE - SWOT ANALYSIS ON DLP, MDM, MAM - LEVERAGING RIGHTSWATCH
Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha
Cloud Computing Key Considerations for Adoption Ramkumar Dargha Abstract Cloud Computing technology and services have been witnessing quite a lot of attention for the past couple of years now. We believe
Subash Krishnaswamy Applications Software Technology Corporation
Oracle Applications and Cloud Computing - Future Direction Subash Krishnaswamy Applications Software Technology Corporation Agenda Introduction ti to CLOUD Oracle Corporation and CLOUD Oracle Applications
Salvage Your Investment in Discoverer with Oracle BI Cloud Services (BICS)
Salvage Your Investment in Discoverer with Oracle BI Cloud Services (BICS) Kshitij Kumar Global VP of BI/EPM and CTO Apps Associates LLC Alan Lee Director, Product Management Oracle Corporation March 10,
CSS CORP SMART MOBILITY SERVICES
Mobility Services Mobility Services As handheld devices and next generation service provider networks enable rich, real time user experiences, mobility is fast emerging as a critical component of enterprise
The New PaaS: Applications Drive the Business
The New PaaS: Applications Drive the Business Larry Carvalho Research Manager Worldwide PaaS Practice www.idc.com June 9, 2015 microsite: http://www.idc.com/cloud @idccloud What are we talking about Path
Ensuring Document Security Across Any Device with the WatchDox Platform
Ensuring Document Security Across Any Device with the WatchDox Platform A WatchDox White Paper February 2013 INTRODUCTION The confidentiality and integrity of our customers documents is of the utmost importance.
Enterprise App Stores: An idea whose time has come?!
Enterprise App Stores: An idea whose time has come?! RSG Webinar " Jan 23, 2014" Kashyap Kompella @realstorygroup Hashtag #RSGWebinar A brief intro to Real Story Group We are a technology research & advisory
Transforming Business Processes with Agile Integrated Platforms
Transforming Business Processes with Agile Integrated Platforms SPRING 2015 Sponsored by SAP Technology Business Research, Inc. Technology changes, but the needs of business do not. Integration is essential
A Nemertes Research Conference The New Technology Game Changers: Big Data, Cloud, and SDN
A Nemertes Research Conference The New Technology Game Changers: Big Data, Cloud, and SDN John Burke Principal Research Analyst & CIO Nemertes Research [email protected] July 29, 2014 About Nemertes
Architecture of Enterprise Mobile Apps
Architecture of Enterprise Mobile Apps November 22, 2011 Sergey Zabaluev http://mobile.ctco.eu Setting the context Business trends need for speed and agility Highly competitive, global marketplace Increasing
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
Mobile and analytics highlight SAVO's summer release
Mobile and analytics highlight SAVO's summer release Analyst: Martin Schneider 17 Jul, 2012 SAVO Group has long been entrenched in some very large businesses as a sales-enablement tool. Over the years
Enterprise Mobile Application Development: Native or Hybrid?
Enterprise Mobile Application Development: Native or Hybrid? Enterprise Mobile Application Development: Native or Hybrid? SevenTablets 855-285-2322 [email protected] http://www.seventablets.com
apiomat Enterprise Mobile Enterprise Application Platform the Next Generation
Mobile Enterprise Application Platform the Next Generation Digital Transformation Mobile is changing the game Starting with Apple s iphone mobile devices have changed economy from the scratch new business
THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
<Insert Picture Here> Enabling Cloud Deployments with Oracle Virtualization
Enabling Cloud Deployments with Oracle Virtualization NAME TITLE The following is intended to outline our general product direction. It is intended for information purposes only,
The Netskope Active Platform
The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across
Business Network and IT Services AT&T Global Managed Mobility Services. Product Ratings. AT&T Global Managed Mobility Services
Business Network and IT Services AT&T Global Managed Mobility Services March 24, 2014 Summary Kathryn Weldon Current Analysis Research Director, Business Network and IT Services Leader Strong Competitive
HDAA BYOD Workshops May 2013
HDAA BYOD Workshops May 2013 Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2 Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market
Mobile-First Strategy. CIO Executive Interview
Mobile-First Strategy CIO Executive Interview Mark Sunday, CIO of Oracle Corporation, interviewed Suhas Uliyar, Vice President of Mobile Strategy Product Management at Oracle, to learn about the critical
Mobile Application Security
Mobile Application Security Rebecca Finnin, AT&T ISACA Geek Week 08/20/2013 AGENDA Mobile Application Development Review Gartner Framework of Mobile App Development Challenges Outline Security Implications
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Design & Innovation from SAP AppHaus Realization with SAP HANA Cloud Platform. Michael Sambeth, Business Development HCP, SAP (Suisse) SA 18.06.
Design & Innovation from SAP AppHaus Realization with SAP HANA Cloud Platform Michael Sambeth, Business Development HCP, SAP (Suisse) SA 18.06.2015 Legal disclaimer The information in this presentation
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
Information Governance for Office 365. Hands On Jaimie Tilbrook Product Development Manager HPRM Governance and Compliance SharePoint App
Information Governance for Office 365 Hands On Jaimie Tilbrook Product Development Manager HPRM Governance and Compliance SharePoint App 1 The Cloud Office 365 SharePoint OneDrive for Business 2 The Cloud
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
ENTERPRISE MOBILITY STRATEGY. We work for you, not your technology vendors.
ENTERPRISE MOBILITY STRATEGY We work for you, not your technology vendors. Navdeep Singla [email protected] www.ondevice.co.uk July, 2013 Access Evolution of Computing Mainframe Centralised Batch processing
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Welcome to the Force.com Developer Day
Welcome to the Force.com Developer Day Sign up for a Developer Edition account at: http://developer.force.com/join Nicola Lalla [email protected] n_lalla nlalla26 Safe Harbor Safe harbor statement under
SaaS & Cloud Application Development & Delivery
SaaS & Cloud Application Development & Delivery A Whitepaper by Ekartha, Inc. by Gurpreet Singh, Ekartha Inc. Raj Sethi, Ekartha Inc. Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516)
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'
W H I T E PA P E R. Cloud Migration Methodology -Janaki Jayachandran (Director of Technology) a t t e n t i o n. a l w a y s.
W H I T E PA P E R Cloud Migration Methodology -Janaki Jayachandran (Director of Technology) a t t e n t i o n. a l w a y s. T A B L E O F C O N T E N T S Introduction Cloud - Is it real or hype? 3 Attributes
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises
Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Speaker Title The following is intended to outline our general product direction. It is intended for information
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Asigra, Inc. with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore,
Oracle RightNow Cloud Service Mobile Agent Solution. Prepared for MUG, Dec 2013. Jason Davis, Sr. Principal, Product Mgmt
Oracle RightNow Cloud Service Mobile Agent Solution Prepared for MUG, Dec 2013. Jason Davis, Sr. Principal, Product Mgmt Agenda Mobile Trends Oracle Service Cloud Mobile Agent Solution Overview Solution
