Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer
The New World
Agenda The Mobile World The Challenges The Solutions
The Mobile World
The Business Challenges
The End User Computing Challenges
The BYOD Challenges Applications Management Inability Invisibility of installed applications on mobile devices Inability to push company s applications to mobile devices No control of rogue applications Company s Assets in Danger Inability to find a lost or stolen device No way to erase company s data on the mobile device
The Branch Office Challenges Centralized Management Give IT the ability to manage all the branch infrastructure from one single location Localized Execution The user experience must be on par with local desktops at the branches Security Must be lightweight yet strong
Solutions Virtual Workspace Infrastructure (VDI+) Workspace Mobility Enablement Desktop As a Service (DaaS) Capex Savings Through VDI As a Service Security MDM DLP NAC "By enabling employees to securely and easily access corporate data on their own device or mobile workspace, productivity levels will naturally increase.
Hosted Virtual Desktops Growth by Vertical Penetration of Hosted Virtual Desktop (HVD) by Verticals -2016 50% 40% 30% 20% 10% 0% 2013 HVD Growth Rate = 49.9% 2014 HVD Growth Rate = 35.7% *HVD Market Forecast Gartner Nov, 2012
Desktop & Application Delivery (VDI) Central Management Growth and speed to market Security and compliance No Data To Endpoint Two Factor Authentication Employee Mobility and device adoption Business Better unique experience continuity TCO than traditional PC
Desktop as a Service Corporate Network DaaS = (Desktop as a Service) VDI managed as a Cloud-based service by a 3rd party vendor or service providers Remote Office Mobile Office Home Desktops in the Cloud! Leverage as a Service Lower Cost, no Cap-Ex Centralized Management Turn-key Services Datacenter proximity Elastic, scalable 1990 Desktop in PC 2008 Desktop in Datacenter Virtual Desktops 2010 Desktops in Cloud
Keeping the Complexity Below the Surface Applications Desktop Management Access Devices Customer Enviroment [OS License] VDI Software Windows Server License Software SQL Server / Data Store SW Patching and Administration Support and Maintenance Servers Storage (RAID Protected) Hardware Networking Infrastructure Hardware Administration Support and Maintenance Racks Facilities Power and Cooling Service Provider Class Data Center ICOM Provides
Hybrid Cloud for EUC Apps Desktops Local Local Hosted Hosted Apps Desktops Cloud Cloud Hosted Hosted Consistent User Experience
Orchestration of BYOD MDM means Mobile Device Management but goes way beyond to cover Applications MDM software secures, monitors, manages and supports mobile devices MDM is deployed in both employee-owned and company-owned devices
What MDM can do? Security Management Real-time protection / GPS Locate & Track / Device Backup/Restore / Remote Alarm/Notification and SIM Change Notification Software Distribution Control Unapproved Apps / Track installed Apps / Company s Internal App store / Rogue App protection / Inventory of installed Apps Policy Management Require Passcode / Number of failed attempts before wipe / Password Complexity requirements / Data Roaming Settings (On/Off) Inventory Management Detailed reporting of asset information / Model name and number / Device s holder name / Serial Numbers / Device s IP Address Service Management Roaming Usage / SMS Usage / Report Most Active Users / Report Data used / WiFi/Cell data speeds
Benefits of MDM Device Management Enforce company s policies across diverse operating platforms (ios, Android etc) Push company s applications to managed devices over-the-air Compliance Workers have both personal and company data on their mobile devices Data and Service security People are using an unsecured mobile device to access secured company data Mobile devices are easily lost or stolen
Data Leakage Prevention Requirements Data identification & classification User roles and responsibilities Regulatory requirements Manage authorizations and actions on data Enforce controls governing What data user can access What user can do with the data Whether user can share data Data access from mobile devices Leakage prevention is an issue that requires a holistic approach
Solutions to Meet Diverse Needs Data leakage cannot be prevented by point solutions Network access control Mobility Web/Email Controlling admin access to systems and data Network Managing smart devices and the BYOD hype Endpoint Controlling Internet access and Email capabilities Endpoint protection mechanisms Virtual Desktop infrastructure
What NAC can do NAC means Network Access/Admission Control When a device tries to connect to a network NAC identifies the device and its type Identifies and authenticates the user of the device Scans device s configuration in order to determine if it is compliant to corporate policies NAC gives full, restricted or prohibited access
Benefits of NAC Mitigation of zero-day attacks The key value of NAC is to prevent computers without Antivirus, patches, OS updates etc to access the network and place other computers & resources at risk Policy Enforcement NAC solutions allow network operators to define policies such as types of computers or roles of users allowed to access corporate resources Identity and access management Where conventional IP networks enforce access policies based on the IP of the system, NAC enforces policies based on the authenticated user identity
Intracom Telecom Data Center Optimization Solutions Infrastructure Services Facilities Management
Intracom Telecom Datacenter Solutions Facilities Management Converged Networking Consolidation & Optimization Security & Compliance Cloud Builder Cloud Based Solutions Cloud Security Private, Public, Hybrid Innovative cloud services Assuring Services delivery Cloud Planning & Design Cloud Implementation Operations organization consulting Backup as a Service Storage as a Service Desktop as a Service Security as a Service Intracom Telecom Strategy Engineering Services Solution Integration Audit & Validation