Mobile Application Ecosystem Scott Agnew May 13 th 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.
Mobile Application Environment You know you need mobile Now what? Target Platforms Goals Security Target Devices Resources 2 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Application Development Options Build Inhouse Mobile Application Platforms Mobile Application Development Third-Party Applications Build It Build Outsourcing Buy 3
BUILD VS. BUY: MOBILE APPLICATIONS Platform Approach Custom Development Multiple Multiple Multiple 5 3 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Mobile Application (MAM) The Three Pillars of Mobile Application Secure Manage Publish SSO authentication Malware checks and code inspection FIPS 140-2 encryption for app and data on the device Per-app VPN to protect data in transit Copy/paste control Targeted app delete Elegant web-based admin dashboard App usage tracking and analytics Crowdsourcing to review user feedback and ratings Rapid scalability across thousands of users Version checking and compliance Force updates or mandatory app install OTA deployment of apps Push notification and badging for new apps and updates Custom branding and design for each customer App categorization and search Publish rich content (PDF, MS Office docs, video and audio) as well as apps 5
Mobile Application Elegant Admin Portal for Managing Apps and Users Add and update company apps Authorize/manage users or groups Review user feedback and ratings with crowdsourcing Apply rich security policies to protect apps and data Inspect apps for malware or poor code Run rich analytics and reports on app usage and adoption Delete apps remotely 6
Mobile Device (MDM) WHAT S IN SCOPE? Remote Consumer Trends Application Security While MDM as a category has been around for several years, it has evolved beyond the traditional lock and wipe capabilities Expense Enterprise Loss & Theft 7 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Mobile Device KEY CAPABILITIES & TABLE STAKES of mixed platforms/devices Carrier agnostic Protect Email Provisioning device enhances protection Application management Device monitoring Policy enforcement and notification Usage management Analysis and reporting Professional and Managed services 9 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.
Summary The environment is complex but manageable Determine Buy or Build Secure the Application Infrastructure (MAM) Secure the Device (MDM) Help is available 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.
THANKYOU 10 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.