Mobile Application Ecosystem



Similar documents
Managing Mobility in the BYOD Era:

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Mobile App Management:

ipad in Business Mobile Device Management

W M U G NL. WMUG Meeting #2 - Deployment MOBILE APPLICATION DEPLOYMENT

iphone in Business Mobile Device Management

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

How To Secure Your Mobile Devices

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobility Manager 9.5. Users Guide

What We Do: Simplify Enterprise Mobility

Choosing an MDM Platform

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Symantec Mobile Management Suite

Deploying iphone and ipad Mobile Device Management

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Mobile Device Management (Mdm) Solution

CHOOSING AN MDM PLATFORM

Mobile Security Without Barriers

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Cisco Mobile Collaboration Management Service

A BUSINESS CASE FOR ENTERPRISE MOBILITY MANAGEMENT

Workplace-as-a-Service BYOD Management

Microsoft Enterprise Mobility Suite

BEST PRACTICES IN BYOD

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

IT Self Service and BYOD Markku A Suistola

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

The Endpoint Evolution Mobility

Stress-free mobility A mobile framework for the extended enterprise. April 29, 2015

QuickStart Guide for Mobile Device Management

IT Resource Management & Mobile Data Protection vs. User Empowerment

How To Secure Your Mobile Device

Secure, Centralized, Simple

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

QuickStart Guide for Mobile Device Management. Version 8.6

User Self-Service Configuration Overview

TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead

Mobile Security and Management Opportunities for Telcos and Service Providers

How To Protect Your Mobile Devices From Security Threats

An Overview of Samsung KNOX Active Directory-based Single Sign-On

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Sophos Mobile Control

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Ensuring the security of your mobile business intelligence

Best Practices for a BYOD World

Creating a Holistic Mobility Strategy Revised Edition. Strategy Analytics Business Mobility Solutions June 2009

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Healthcare Buyers Guide: Mobile Device Management

Securing Enterprise Mobility for Greater Competitive Advantage

AT&T Global Network Client Domain Logon Guide. Version 9.6

Total Enterprise Mobility. Norbert Elek

Symantec Mobile Security

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Copyright 2013, 3CX Ltd.

IBM Cognos Mobile Overview

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity

Codeproof Mobile Security & SaaS MDM Platform

Safely Extend the Enterprise to Personal Mobile Devices

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Technical Whitepaper. Secure Docs

Kony Mobile Application Management (MAM)

Enterprise Mobility as a Service

Solve BYOD with! Workspace as a Service!

NCSU SSO. Case Study

Xperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment.

Good for Enterprise Good Dynamics

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

ForeScout MDM Enterprise

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

The ForeScout Difference

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Athena Mobile Device Management from Symantec

"Secure insight, anytime, anywhere."

Enterprise Mobility: winning strategies to get your organization ready for the future

The Cloud-Enabled Social Mobile Enterprise. Neil Florio, Fiberlink Andrew Borg, Aberdeen Group

AVG Business SSO Partner Getting Started Guide

MDM, COPE, BYOD, MAM, MIM, PIM???

Cortado Corporate Server

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Manage the Mobile Workforce Without the Complexity and Expense of an On-Premise Installation

MSP Dashboard. Solution Guide

SOTI Inc. Presents. Andrew Aldis - Presale and professional service engineer jayp@soti.net.

How Nokia deployed AirWatch MDM for Nokia Lumia

MDM Mobile Device Management

MobileIron and Samsung Value Proposition

Enterprise Mobility: A Market Perspective!!

Transcription:

Mobile Application Ecosystem Scott Agnew May 13 th 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.

Mobile Application Environment You know you need mobile Now what? Target Platforms Goals Security Target Devices Resources 2 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

Application Development Options Build Inhouse Mobile Application Platforms Mobile Application Development Third-Party Applications Build It Build Outsourcing Buy 3

BUILD VS. BUY: MOBILE APPLICATIONS Platform Approach Custom Development Multiple Multiple Multiple 5 3 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

Mobile Application (MAM) The Three Pillars of Mobile Application Secure Manage Publish SSO authentication Malware checks and code inspection FIPS 140-2 encryption for app and data on the device Per-app VPN to protect data in transit Copy/paste control Targeted app delete Elegant web-based admin dashboard App usage tracking and analytics Crowdsourcing to review user feedback and ratings Rapid scalability across thousands of users Version checking and compliance Force updates or mandatory app install OTA deployment of apps Push notification and badging for new apps and updates Custom branding and design for each customer App categorization and search Publish rich content (PDF, MS Office docs, video and audio) as well as apps 5

Mobile Application Elegant Admin Portal for Managing Apps and Users Add and update company apps Authorize/manage users or groups Review user feedback and ratings with crowdsourcing Apply rich security policies to protect apps and data Inspect apps for malware or poor code Run rich analytics and reports on app usage and adoption Delete apps remotely 6

Mobile Device (MDM) WHAT S IN SCOPE? Remote Consumer Trends Application Security While MDM as a category has been around for several years, it has evolved beyond the traditional lock and wipe capabilities Expense Enterprise Loss & Theft 7 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

Mobile Device KEY CAPABILITIES & TABLE STAKES of mixed platforms/devices Carrier agnostic Protect Email Provisioning device enhances protection Application management Device monitoring Policy enforcement and notification Usage management Analysis and reporting Professional and Managed services 9 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

Summary The environment is complex but manageable Determine Buy or Build Secure the Application Infrastructure (MAM) Secure the Device (MDM) Help is available 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.

THANKYOU 10 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.