Optimizing the Mobile Cloud Era Through Agility and Automation



Similar documents
What We Do: Simplify Enterprise Mobility

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Solve BYOD with! Workspace as a Service!

VMware End User Computing

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Business Values of Network and Security Virtualization

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

AirWatch Solution Overview

VMware End User Computing Horizon Suite

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Embracing Complete BYOD Security with MDM and NAC

Mobile device and application management. Speaker Name Date

The ForeScout Difference

Netzwerkvirtualisierung? Aber mit Sicherheit!

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

BYOD & MOBILE SECURITY: EMPOWERING EMPLOYEES WHLE SECURING CORPORATE ASSETS

Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

ForeScout MDM Enterprise

What Is Cisco Mobile Workspace Solution?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

CA Enterprise Mobility Management MSO

The Oracle Mobile Security Suite: Secure Adoption of BYOD

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

VMware s Virtualization & Cloud Computing Solutions for Enterprise

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Limiting the Spread of Threats: A Data Center for Every User

Roadmap to Solving Enterprise Mobility

AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

End User Computing - Cloud Client Computing

Best Practices for a BYOD World

Smart Desktop Virtualization for the Mobile Workforce. Survey of IT pros highlights untapped benefits of VDI and DaaS in a mobile-first world

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Mobility and cloud transform access and delivery of apps, desktops and data

IT Enterprise Services

Microsoft Enterprise Mobility and Client Futures

5 Must-Haves for an Enterprise Mobility Management (EMM) Solution

End-user Security Analytics Strengthens Protection with ArcSight

Top 10 Reasons why VDI is not a good solution for BYOD

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Athena Mobile Device Management from Symantec

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Dell World Software User Forum 2013

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Introduction to the Mobile Access Gateway

Security and Compliance challenges in Mobile environment

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

Secure mobility with Citrix & Cisco

Revitalising your Data Centre by Injecting Cloud Computing Attributes. Ricardo Lamas, Cloud Computing Consulting Architect IBM Australia

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Powered by. FSS Buyer s Guide Why a File Sync & Sharing Solution is Critical for Your Business

Symantec Mobile Management for Configuration Manager 7.2

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Readiness Assessments: Vital to Secure Mobility

Sophos Mobile Control

Horizon Workspace Suite Juan I. Vera End User Computing Specialist

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

HP CLOUD SYSTEM. The most complete, integrated platform for building and managing clouds featuring Intel technologies.

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

If you can't beat them - secure them

How To Protect A Virtual Desktop From Attack

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Transcription:

Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware

Industry Trends

Explosive Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population 2011-2015 Forecast Tablets are forecasted to reach 468 Million in 2017 Source: Gartner Forecast: Devices by Operating System and User Type, Worldwide 2010-2017, 3Q13 Update Smartphones forecasted to reach 2.1 Billion in 2017 Source: Gartner Forecast: Devices by Operating System, Worldwide, 2010-2017, 3Q13 Update of people reported they are using their personal device at work Source: Gartner Device: The Facts and the Future, 11 April 2013 3

Business Mobility Transformation 3.5 Billion Deployed globally by 2019 Source: Forrester Research World Mobile And Smartphone Adoption Forecast, 2014 To 2019 (Global: August 2014) > 50% Customer-facing and employee-facing IT investments will be mobile-focused Source: Gartner 2015 CIO Agenda: 2,810 CIOs responded to this year s survey, representing approximately $397 billion in IT spending across 84 countries 189 Billion Invested to engineer platforms and processes for mobile engagement in 2017 Source: 2015: The Year Of The Mobile Singularity, Readwrite.com article, December 2014

The Mobile / Cloud Era is Changing How We Work From Employee Productivity To Business Transformation 5

What Users Want: Any App on Any Device

8 What IT Wants: Mobile Cloud Architecture

Our Focus Today Any Device Any Application Any One Device Cloud

Harnessing Mobile and Cloud Is Challenging SERVICE OUTAGES SLOW REPONSES SECURITY PROLIFERATION OF DEVICES CLOUD SILOS HIGH USER EXPECTATIONS DECLINING BUDGET INTEGRATION PROBLEMS PRIVACY ISSUES FRAGMENTED DATA CENTER SHORTAGE OF RIGHT SKILLS DIFFERENT APPLICATIONS AGING INFRASTRUCTURE LIMITED RESOURCES

New Approach to Mobile Security and Identity Old Mindset New Approach Only trust devices where you manage the OS Device Trust established by the Domain Access Controlled by Network Management Manage and secure apps and content Device Trust established through enrollment Access Controlled by Identity Management 11

Mobile Cloud Architecture Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern, Cloud Applications Cloud Management HYBRID CLOUD One Cloud PRIVATE Your Data Center MANAGED Cloud Air Network PUBLIC Cloud Air Virtualized Compute, Network, Storage Build-Your-Own Converged Infrastructure Hyper-Converged Infrastructure 12

AirWatch by VMware

Mobile Cloud Architecture Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern, Cloud Applications Cloud Management HYBRID CLOUD One Cloud PRIVATE Your Data Center MANAGED Cloud Air Network PUBLIC Cloud Air Virtualized Compute, Network, Storage Build-Your-Own Converged Infrastructure Hyper-Converged Infrastructure 14

15 Enterprise Mobility Management (EMM) Apps Browser Content Device Email Mobile <insert space> Management Workspace Video Chat Display Teacher Tools

For Unified Endpoint Management Every Endpoint Every OS Every Use Case Mobile Devices Laptops Corporate BYOD Rugged Devices Printers & Peripherals Shared Line of Business

VMware Identity Manager

Mobile Cloud Architecture Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern, Cloud Applications Cloud Management HYBRID CLOUD One Cloud PRIVATE Your Data Center MANAGED Cloud Air Network PUBLIC Cloud Air Virtualized Compute, Network, Storage Build-Your-Own Converged Infrastructure Hyper-Converged Infrastructure 18

The Challenges Customers are Facing with Identity Enforce security and compliance without hampering workers Time and complexity in delivering new apps and services services Gaining visibility into user access. Who has access to when, and when Complexity of scale and growth (Operations, Helpdesk) Protecting apps and data from unauthorized access is important but authentication and ease of use needs to be straightforward Employees and their devices are increasingly on the go. Access control to apps becomes more important than networks. Device diversity adds to the complexity Real-time visibility, proactive alerting, reporting and analytics are all required to know what apps are being used, when, and by whom. This helps manage licensing, SLAs, and maintenance windows A general state of readiness to scale as traffic, users and devices grow in number across the organization 19

Identity Manager Simplify Business Mobility with One-touch From Any Device Optimize User Experience And Security with Airwatch Adaptive Access Empower Employees with a Self-Service App Store Grow with Trusted VMware Enterprise-grade Hybrid Cloud Infrastructure Enterprise Single Sign-On Industry leading support for Web, Windows, Native Mobile Apps All from one place Pre-integrated with many enterprise apps Native integrated app launcher Dynamic per-app VPN AirWatch smart authentication Device Analytics Self-service app catalog Responsive HTML5 app launcher User analytics Custom Brandable Web Portal Application provisioning Directory integration and federation Hybrid deployment model Conditional Policy Engine Universal Authentication Broker 20

When Identity Management meets AirWatch Mobility Management Native Mobile Single Sign-On No app wrapping or SDK One-touch authentication Managed or Unmanaged Conditional Access Built in CA Built in VPN Built in IdP Built in Kerb / Cert adapter 21

Empower employees John Smith Self-service app catalog Responsive HTML5 app launcher User analytics Custom skinned web portal Application provisioning 22

Grow with trusted VMware enterprise-grade infrastructure Directory integration and federation Hybrid deployment model Conditional Policy Engine Universal Authentication Broker 23

NSX

Mobile Cloud Architecture Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern, Cloud Applications Cloud Management HYBRID CLOUD One Cloud PRIVATE Your Data Center MANAGED Cloud Air Network PUBLIC Cloud Air Virtualized Compute, Network, Storage Build-Your-Own Converged Infrastructure Hyper-Converged Infrastructure 25

Desktop & App Virtualization: Better Security for Data at Rest Desktop and app virtualization places O/S, apps and data in the data center Loss of data sitting on devices (device loss, theft, damage) Unauthorized access to sensitive applications installed on devices WWW WWW SAP, Servers Oracle Exchange, etc. Reduced branch infrastructure footprint (file/print/email servers etc.) Data Center Other Users Virtual Desktop Enterprise Storage Conducive to efficient, centralized backup Centralized patching against vulnerabilities CONFIDENTIAL 26

Your Data Center = Much Larger Attack Surface Desktop Virtualization poses new security considerations: Exposes very large attack surface within the data center Multiple east-west flows between users and infrastructure What VDI Doesn t Address: User behaviors Zero-day threats WWW EAST WEST SAP, Oracle Exchange, etc. Compromised internet websites Data Center Other Users Virtual Desktop Enterprise Storage Desktop-to-desktop hacking Desktop-to-server hacking CONFIDENTIAL 2 7

Encapsulation Organizations with focus on compliancy and risk mitigation will implement security zones to protect East-West flows within the data center Hard to implement Corp Zone Lots of physical infrastructure required PCI Zone Remote workforce Zone Shared svcs DB Zone Dev Zone Eng Zone Complex to manage DMZ Admin Zone Financial Zone 28 CONFIDENTIAL

29 CONFIDENTIAL NSX Micro-segmentation: Addressing the East-West Challenge Establish a network of one for each desktop Eliminate cross-talk between networks Minimized attack surface keep threats from spreading Policy defined centrally, automatically attached to VM as created Persistently follows desktop wherever it resides

Mobile Cloud Architecture Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern, Cloud Applications Cloud Management HYBRID CLOUD One Cloud PRIVATE Your Data Center MANAGED Cloud Air Network PUBLIC Cloud Air Virtualized Compute, Network, Storage Build-Your-Own Converged Infrastructure Hyper-Converged Infrastructure 30

Thank you! 31