Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement



Similar documents
5 Pillars of API Management with CA Technologies

Authentication Strategy: Balancing Security and Convenience

5 Ways to Get Top Mobile App Developer Talent for Your Open APIs

An Enterprise Architect s Guide to API Integration for ESB and SOA

Architecture in the API Era

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SOLUTION BRIEF BIG DATA MANAGEMENT. How Can You Streamline Big Data Management?

how can I improve performance of my customer service level agreements while reducing cost?

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Management Experience

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

CONTINUOUS DEPLOYMENT EBOOK SERIES: Chapter 1. Why Continuous Deployment Is Critical to Your Digital Transformation Strategy

API Strategy and Architecture: A Coordinated Approach

Can My Identity Management Solution Quickly Adapt to Changing Business Requirements and Processes?

Building a Roadmap to Robust Identity and Access Management

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business

SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?

CA Workload Automation for SAP Software

Connecting Applications from Mobile to Mainframe in the Application Economy

CA Service Desk Manager - Mobile Enabler 2.0

1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com. CA Security SaaS Validation Program. Copyright 2015 CA. All Rights Reserved.

Achieve Your Business and IT Goals with Help from CA Services

are you helping your customers achieve their expectations for IT based service quality and availability?

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

A to Z Information Services stands out from the competition with CA Recovery Management solutions

Can I customize my identity management deployment without extensive coding and services?

Securely Outsourcing to the Cloud: Five Key Questions to Ask

Beyond passwords: Protect the mobile enterprise with smarter security solutions

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

CA Mobile Device Management 2014 Q1 Getting Started

Closing the Biggest Security Hole in Web Application Delivery

CA Repository for z/os r7.2

CA Explore Performance Management for z/vm

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio

Can you simplify the buying and managing of services for your customers?

Don t Go In Blind: Navigating the Journey to the Cloud. agility made possible

Atkins safeguards availability of client s geospatial systems with a CA AppLogic private cloud environment

The Future of Workload Automation in the Application Economy

CA Technologies optimizes business systems worldwide with enterprise data model

agility made possible

Global Bank Achieves Significant Savings and Increased Transaction Volume with Zero-Touch Authentication

expanding web single sign-on to cloud and mobile environments agility made possible

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

CA SiteMinder SSO Agents for ERP Systems

can I customize my identity management deployment without extensive coding and services?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services

Business Agility SURVIVAL GUIDE

A Comprehensive Solution for API Management

Radix Technologies China establishes compelling cloud services using CA AppLogic

how can I comprehensively control sensitive content within Microsoft SharePoint?

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Sallie Mae slashes change management costs and complexity with CA SCM

Service Virtualization CA LISA introduction. Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

agility made possible

agility made possible

Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009

CA SOLVE:Central Service Desk for z/os

How To Use Ca Product Vision

turnkey clouds, turnkey profits

agility made possible

Centris optimises user support with integrated service desk

How Can I Deliver Innovative Customer Services Across Increasingly Complex, Converged Infrastructure With Less Management Effort And Lower Cost?

Data Model s Role in DaaS...3. The SQL Azure Use Case...4. Best Practices and Guidelines...5

How To Improve Your It Performance

Federated Identity and Single Sign-On using CA API Gateway

CA Cloud Service Delivery Platform

Accelerating the Development of Enterprise Mobile and IoT Apps ESSENTIAL APIS AND TOOLS DEVELOPERS NEED TO BUILD FIVE-STAR APPS

How Can Central IT Use Cloud Technologies to Revolutionize Remote Store Operation?

Designing a CA Single Sign-On Architecture for Enhanced Security

CA Chorus Helps Reduce Costs, Improve Productivity and Assist With Mainframe Skills Retention

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

CA Workload Automation Agents for Mainframe-Hosted Implementations

CA Technologies Solutions for Criminal Justice Information Security Compliance

The Oracle Mobile Security Suite: Secure Adoption of BYOD

agility made possible

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Big Data Without Big Headaches: Managing Your Big Data Infrastructure for Optimal Efficiency

CA Enterprise Mobility Management MSO

Big Data and Collaboration: Security Solutions from On-Premises to Cloud and Mobile

API Management Introduction and Principles

Best Practices for Secure Mobile Access

CA Process Automation for System z 3.1

CA Server Automation. Overview. Benefits. agility made possible

CA s Cloud Storage for System z

CA Business Service Insight

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Crossing the DevOps Chasm

CA Clarity Integration

The Advantages of Converged Infrastructure Management

AVTech provides customers with end-to-end recovery management service with CA ARCserve solutions

ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies

Sicredi improves data center monitoring with CA Data Center Infrastructure Management

how can you shift from managing technology to driving new and innovative business services?

protect your assets. control your spending

Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions

CA NetMaster Network Management for TCP/IP r12.0

Transcription:

Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement

Introduction: The Opportunities & Challenges of Enterprise Mobility Apps & the Enterprise The existence of smartphones and tablets able to run lightweight apps has created a quantum leap in the potential of mobile devices in the workplace. Apps present enterprises with clear benefits in terms of maximizing employee connectivity, availability, flexibility and productivity. Many enterprises have begun investigating how they can realize these benefits. Meanwhile, employees have independently started using their personal devices for work launching the BYOD ( bring-your-own-device ) movement. Example 1: Mobile Field Enablement for Health Insurance A leading health insurance provider gave field operatives Apple ipads with a custom app that made it possible to enter customer data into a central database when making house calls. This allowed operatives to spend more time on customer service and less on administrative tasks, while increasing the accuracy of data collected. Example 2: Baggage Handling App A major US airline created an app that allowed its baggage handlers to access critical flight information via their mobile phones. The app allowed ground crews to better expedite the loading and unloading of baggage from flights, decreasing baggage handling times and therefore increasing customer satisfaction. 02

Introduction: The Opportunities & Challenges of Enterprise Mobility The Challenges of Enterprise Mobility Enterprises are finding that, to get true, measurable benefits from employee mobility and BYOD, they need ways to: Deploy apps, like those described above, which give employees mobile access to missioncritical data and functionality from on-premise applications Ensure these apps provide seamless access to the necessary data and functionality without compromising the security of on-premise systems So, how do enterprises approach these challenges? For many organizations, dipping a toe into the onrushing torrent of mobile innovation can seem daunting. However, if viewed historically, the challenges of enterprise mobility start to seem much more approachable. Mobile & the Open Enterprise Since the dawn of the World Wide Web, boundaries surrounding enterprises information assets have become far less rigid. More recently, Web-like IT concepts such as Service Oriented Architecture (SOA) have become central to how enterprises provide access to these assets. In these Web-like architectures, enterprises use application programming interfaces (APIs) to open their on-premise data and application functionality for reuse in new on-premise systems and partner applications, as well as online tools open to customers or even the general public. Clearly, opening on-premise systems in this way creates serious security and management challenges for enterprises. To help organizations address these challenges, new technology paradigms and product categories have emerged notably API Management. In this ebook, we describe five key ways enterprises can securely and manageably leverage their existing information assets not just SOA services but any legacy systems in order to give their employees anywhere access to key data and application functionality. 03

Overview: 5 Essentials for BYOD & Mobile Enablement Expose Internal Applications as APIs Publish APIs to expose on-premise applications as reusable services Optimize APIs for Mobile Efficiently deliver legacy application functionality via mobile ready APIs Secure & Manage Data Exposed via Mobile APIs Control the flow of data to protect APIs against attack and to ensure availability Institute Identity & Access Control Systems Secure enterprise systems against unauthorized use while ensuring seamless Mobile Access Enable & Educate App Developers Give your developers access to the resources they need to create really useful apps 04

CHAPTER 1: Expose Internal Applications as APIs Publish APIs to expose on-premise applications as reusable services WHAT WHY HOW In SOA, enterprise architects maximize IT efficiency by making application data and functionality available for reuse in other applications. This is achieved via programming interfaces that deliver applications as reusable services. Increasingly, APIs are used to make these services available outside enterprise boundaries. Even for organizations that do not have existing SOA systems, the API approach can be leveraged relatively easily to reuse legacy data and applications in mobile apps. This focus on reuse emerged so that enterprise architects could adapt to the emergence of powerful new technology paradigms without having to start from scratch each time. The mobile app represents exactly the type of paradigm the API-based approach to enterprise architecture was designed to prepare enterprises for. So, for many enterprises, the key to responding to the app paradigm and BYOD will be repurposing existing interfaces or designing new APIs, when necessary. In most cases, the new APIs will be designed specifically to enable in-house or contracted developers to build apps that leverage internal information assets. Interfaces should be designed specifically for mobile. For example, it may be necessary to translate application data from the SOAP protocol to enable REST-style interactions. As the APIs will expose enterprise information assets to apps via public mobile networks, strong data security and access control measures must be put in place. LEARN MORE White Paper: Secure Mobile Access for Enterprise Employees Simplify security and management for enterprise-level apps and BYOD 05

CHAPTER 2: Optimize APIs for Mobile Efficiently deliver legacy application functionality via mobile ready APIs WHAT WHY HOW Existing enterprise APIs are often unsuitable for exposing services to app developers. Therefore, a mobile strategy will require the creation of new mobile ready interfaces. Typically, this will involve enabling translation from SOAP (or other legacy protocols) to REST and using filtering, caching and compression to deliver data in lighter formats. It may also involve delivering functionality for streaming protocols and services that are particularly useful in mobile apps e.g. WebSocket, XMPP, Apple Push Notifications. Enterprise data must be delivered via mobilefriendly interaction styles and protocols (REST, JSON etc.) to enable the creation of apps that effectively leverage the data. Also, data must be delivered in appropriately lightweight formats in order for apps to run stably, efficiently and reliably enough for employees to get true value from them. By leveraging new mobile-friendly protocols and mobile-specific services, developers can create apps that add new, interactive value to existing application functionality. The process of optimizing APIs for mobile apps can be greatly simplified by deploying an API Gateway, either as a physical networking appliance or as a virtual machine. To be effective for mobile, an API Gateway should be able automate the process of translating legacy services to mobile-friendly protocols and lightweight data formats. API Gateways designed specifically with mobile in mind should also deliver out-of-the-box functionality for common streaming protocols and notification systems. 06

CHAPTER 3: Secure & Manage Data Exposed via Mobile APIs Control the flow of data to protect APIs against attack and to ensure availability WHAT WHY HOW Security is always an issue when an enterprise exposes its information assets via APIs, particularly when these assets will be accessed outside the company firewall. Therefore, in any API-based scenario, security measures must be taken to protect the APIs against denial of service, SQL injection and other types of attack or misuse. Additionally, data throughput should be throttled to make sure services remain consistently available, maintaining compliance with service level agreements (SLAs). Clearly, enterprises have a strong interest in ensuring the security of their mission-critical systems, if only to meet data privacy standards and regulatory requirements. Concerns over API security are amplified in mobile scenarios, where data travels over consumerfocused wireless communications networks. These concerns are only made more severe by BYOD because enterprises cannot lock down personal mobile devices the way they might with corporate hardware. As well as optimizing the performance of mobile APIs, an API Gateway can significantly simplify the process of securing APIs against attack and misuse. A full-functioned API Gateway should have features for preventing all common attacks and should be easy to update, ensuring the latest threats are always covered. An API Gateway should ideally be certified to meet the widest possible range of security standards. FIPS and PCI-DSS provide particularly notable examples. 07

CHAPTER 4: Institute Identity & Access Control Systems Secure enterprise systems against unauthorized use while ensuring seamless Mobile Access WHAT WHY HOW Access is central to enterprise mobile app effectiveness. For apps to work, employees must be able to seamlessly access on-premise data beyond the enterprise perimeter. At the same time, data should only be exposed on a temporary basis and access to the data should be strictly limited to authorized users. To ensure this balance between effectiveness and data security, apps must be able to leverage strong identity and access management (IAM) functionality. Exposing on-premise systems to mobile devices via public wireless networks creates a significant risk of unauthorized parties accessing sensitive enterprise data. However, the value of mobile technology comes from the flexibility, seamless convenience and level of personal control it provides access control should not impact this. This security/openness balance can only be achieved via the type of authentication and authorization functionality already used by common enterprise IAM systems. Mobile device management (MDM) solutions are popular but they usually take a somewhat inflexible, BYOD-unfriendly approach to access control. A more constructive approach is to use a Gateway to flexibly enforce API access policies based on user, group, attributes and even geo-location (rather than by device). For truly seamless access, the Gateway must also be able to integrate with on-premise IAM systems and leverage API-friendly standards like OAuth and OpenID Connect. 08

CHAPTER 5: Enable & Educate App Developers Give your developers access to the resources they need to create really useful apps WHAT WHY HOW Many consumer-focused apps result from organizations opening their APIs to the long tail of lone hackers, working to their own specifications and schedules. Employee-focused enterprise apps are more likely to result from APIs published privately to internal resources or devs contracted to deliver specific corporate requirements. In either case, it is essential to provide developers with the tools and materials they need in order to access, learn about, try out and build apps against your mobile APIs. Developers are the lifeblood of any mobile app strategy. To get real results, you need developers to create apps your employees can actually use and benefit from. To get developers creating apps your employees can use, you need to provide them with well-designed mobile APIs and any tools necessary to effectively leverage these APIs. The better the APIs you design and the more tools you provide to enable and educate your developers, the more useful the apps these developers deliver will be. An organization targeting long-tail developers will commonly deliver APIs via an online portal where devs can register for, learn about and test the APIs. In fact, building an API Portal of this kind is also an extremely effective way of enabling internal and contracted mobile app developers to leverage private APIs. A full-featured API Portal should provide access to interactive documentation, code examples, sample apps, testing tools and discussion forums. 09

Conclusion: Deploying a Mobile Access Gateway Responding to the opportunities presented by employee mobility and the challenges created by BYOD does not have to be as complex as you might think. Deploying an API Gateway or using an API/SOA Gateway that is already in place can greatly simplify the process of securely opening up on-premise data and application functionality to custom-made mobile apps. However, most Gateways on the market do not currently have the full set of functionality necessary for a genuinely secure and effective mobile enablement strategy. That is why CA Technologies has expanded the functionality of its API Gateway products to create a Mobile Access Gateway. The CA Mobile API Gateway includes all the functionality of CA Technologies API Proxy and SOA Gateway products and it adds a range of mobile-specific features, including support for OAuth, WebSocket, XMPP, data filtering and more. Combined with the CA API Developer Portal, the CA Mobile API Gateway delivers a complete enterprise mobile enablement solution. 12 10

Visit ca.com/api for more information CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate across mobile, private and public cloud, distributed and mainframe environments. Learn more at ca.com. Copyright 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. The information and results illustrated here are based upon the speaker s experiences with the referenced software product in a variety of environments, which may include production and nonproduction environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments. CS200-86767