SlideShare une entreprise Scribd logo
1  sur  18
Droidcon 2012




Enterprise Android –
for the win?
DroidCon 2012
Jan Peuker, Accenture
Raoul Neu, Elca Informatik
Droidcon 2012




«The purpose of an organization is
to enable ordinary humans beings
to do extraordinary things» Peter F. Drucker
 Large Organizations have to strictly follow rules and laws
     Very risk averse, very security and privacy aware
     Rigid development standards and quality assurance
 Large Organizations are internationally spread
     IT as business enabler, not feature- but productivity-driven
     IT usually outsourced – documentation and processes mandatory
 We look at corporate internal applications
Droidcon 2012




What makes Android so interesting
for the enterprise?
Captain Jean-Luc Picard:      There's an aura
                              around him.
Lieutenant Geordi La Forge:   Well, of course, he's
                              an android.
Droidcon 2012




Standards = Cost efficency
Droidcon 2012




Challengers
iOS                                   Windows [mobile|embedded|CE|phone]
 Very strong C-Level visibility,      Windows CE is the standard
  favorite in BYOD schemes              mobile productivity platform
 Very good enterprise                 Broad range of rugged and
  features, particularly for            hardware (SAM) secured devices
  update and hardware services         Very good enterprise features,
 Strong device and mail encryption     very strong Outlook integration
 Development requires                 WP 7 incompatible, Windows
  separate infrastructure               Embedded 8 could be game-changer

Most importantly, though, they care.
Droidcon 2012




«I had a problem so I thought to use Java –
      now I have a ProblemFactory»
Droidcon 2012

«We seek peaceful co-existence»
Capt. Remmick


or: Supporting multiple platforms

 The right choice: Native, Hybrid or Cross-Platform
     No silver bullet. Analyze your requirements & constraints.


 MEAP: Advantages & Drawbacks
     Pro’s in integration and governance. Con’s in usability and native features.
Droidcon 2012

  Native Code                                                                                     Thick
                                                                                     Cross-       Client
                                                                                      Code
                                                                                    Generator
                                                                           Rich
                                                                           Client

                                                                VM /
                                                               Runtime                          How much
                                                                                                users actually
                                                                                                like it*
                                                      Hybrid
                                                       App                                          How much it
                                          Web                                                       fits enterprise
                                         Starter                                                    standards
                             Web
                             Client

   Generic Code


                       Generic UI                                                          Native UI




*) the uncanny valley, see http://martinfowler.com/bliki/CrossPlatformMobile.html
«How can you be certain they're                                         Droidcon 2012



receiving us?»                 Capt. Picard



or: Supporting multiple devices
 Blacklists vs Whitelists
    Trusted Certificates vary between device/api/provider


 API & Development Issues
    HttpUrlConnection vs DefaultHttpClient
    Different Bouncycastle algorithms and hardware security features
    Missing XML validation


 Licensing 3rd party software.
    Best technical solution            Business model
«Mr. Data, is that the trouble I                                          Droidcon 2012



believe it is?»             Capt. Picard



or: Supporting multiple apps
 Dealing with enterprise release and life cycles
    Always be ready to release. Think of test environment and repositories


 Intergalactic Continuous Integration
    Not out of the box: strong & exotic hardware requirements


 Missing Distribution Channels
    Android stays behind its competitors
Droidcon 2012


SVN
branch


 SVN
  trunk




          SSH
Droidcon 2012




How do you manage the diversity of
rules and guidelines in an enterprise?
Droidcon 2012




«The bureaucratic mentality is the
 only constant in the universe» Dr. McCoy
 Governance is key
    Enterprises applications require transactions and accountability
    Device state and user assignment must be maintainable
    E-Mail, Clipboard, Intents and Caches often not properly secured


 Security is key
    Device Encryption and Application Safety are mandatory
    Trusted context either via virtualization (BizzTrust, VMware) or
     encryption e.g. with hardware modules (3LM, Certgate, Ageto)
    Tradeoff: Most sophisticated protection is not integrated in standard
     Android. Requires rooting, which itself is a security risk.
Droidcon 2012

            «One of the advantages of being a Captain
             is being able to ask for advice without
             necessarily having to take it.» Cpt. Kirk
             Bring your own device (BYOD)
                    Most employees do not want complex device passwords or full
                     control over their device and route all internet traffic over VPN*
                    Currently no distinction between Corporate/Private data (except
                     for dual-boot or application-level encryption)
                    Rooting and malicious software must be recognized
             Connectivity
                    Connectivity should usually established over secure channels
                    Android does not support Proxy Authentication, Wi-Fi configuration
                    Tethering and Bluetooth cannot be controlled


*) Which, luckily, is currently impossible anyways
Droidcon 2012




Missing features:
What will the future bring?
Droidcon 2012




«Reports of my assimilation have been
greatly exaggerated» Cpt. Picard
 Missing ecosystem features
      Enterprise Market with CA for trusted applications
      OTA Update API without Google account
      Clear Chrome (Jelly Bean), Motorola and Samsung strategy
      Understanding of enterprise features with app makers
 Missing security features
      MDM which supports user certificates, CA’s and network config
      Wi-Fi Proxy Authentication, Full VPN routing, EAP-SIM
      Real ASLR and storage encryption for corporate/private stores
      E-Mail and Exchange features for S/MIME and two-factor auth
      Robust Synchronization (SyncML), Robust Service and SSL API
Droidcon 2012




Recap
   Align to enterprise policies, prepare for non-market distribution
   Embrace development standards, KPI’s and lifecycles
   Thoroughly manage traceability, accountability and privacy
   Prepare for integration using secure Webservices and XML
   Prepare for fragmented device base and users who need to be
    supported by – in the end – yourself (incomprehensible pain)
Droidcon 2012




May the force be with you.

jan.peuker@accenture.com
raoul.neu@elca.ch

Contenu connexe

Tendances

Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013Magic Software
 
Magic quadrant for_wc2010
Magic quadrant for_wc2010Magic quadrant for_wc2010
Magic quadrant for_wc2010razvan001
 
Silicon Overdrive IT Services
Silicon Overdrive IT ServicesSilicon Overdrive IT Services
Silicon Overdrive IT ServicesRyan Fullerton
 
Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0Mark Cesario
 
Kony - The multi Channel Challenge
Kony - The multi Channel Challenge Kony - The multi Channel Challenge
Kony - The multi Channel Challenge mickeyheil
 
Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2gaborvodics
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Next Generation UC Clients and Endpoints
Next Generation UC Clients and EndpointsNext Generation UC Clients and Endpoints
Next Generation UC Clients and EndpointsCisco Canada
 
Teclever so and cs v0.9
Teclever so and cs v0.9Teclever so and cs v0.9
Teclever so and cs v0.9tanima123
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalKevin Suitor
 
Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks Videoguy
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile SoftwareCollaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile SoftwareIBM Software India
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile StrategyWe4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile StrategyWe4IT Group
 

Tendances (20)

Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013Magic mobile webinar_Jan2013
Magic mobile webinar_Jan2013
 
Magic quadrant for_wc2010
Magic quadrant for_wc2010Magic quadrant for_wc2010
Magic quadrant for_wc2010
 
Silicon Overdrive IT Services
Silicon Overdrive IT ServicesSilicon Overdrive IT Services
Silicon Overdrive IT Services
 
Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0Ibm mobile strategy may2012 mark.cesario v1.0
Ibm mobile strategy may2012 mark.cesario v1.0
 
Kony - The multi Channel Challenge
Kony - The multi Channel Challenge Kony - The multi Channel Challenge
Kony - The multi Channel Challenge
 
Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2Worklight 5.0 Webinar 7 12 V2
Worklight 5.0 Webinar 7 12 V2
 
SETA international (sv)
SETA international (sv)SETA international (sv)
SETA international (sv)
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Next Generation UC Clients and Endpoints
Next Generation UC Clients and EndpointsNext Generation UC Clients and Endpoints
Next Generation UC Clients and Endpoints
 
Teclever so and cs v0.9
Teclever so and cs v0.9Teclever so and cs v0.9
Teclever so and cs v0.9
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-finalExinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
Exinda Kevin-Suitor-Managing-Mobile-Devices-in-the-WAN-28 june11-final
 
Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks Application Delivery Networks - Enabling Video Ready Networks
Application Delivery Networks - Enabling Video Ready Networks
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile SoftwareCollaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile StrategyWe4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
We4IT LCTY 2013 - Captain Mobility - INV102 Mobile Strategy
 

En vedette

]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”Klaus Hofeditz
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Pricing models for android enterprise applications
Pricing models for android enterprise applicationsPricing models for android enterprise applications
Pricing models for android enterprise applicationsCRMIT
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereDennis Heinle
 
Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application developmentParamvir Singh
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra Microgroup
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise IntegrationDominik Helleberg
 

En vedette (9)

]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Pricing models for android enterprise applications
Pricing models for android enterprise applicationsPricing models for android enterprise applications
Pricing models for android enterprise applications
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application development
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Android for the Enterprise and OEMs
Android for the Enterprise and OEMsAndroid for the Enterprise and OEMs
Android for the Enterprise and OEMs
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise Integration
 

Similaire à Peuker, Neu: Enterprise Android for the Win

Worklight mobile v6
Worklight mobile v6 Worklight mobile v6
Worklight mobile v6 GameStop
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 ExternalSarah Thomas
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app developmentMuthu Kumar
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance WebinarGrafic.guru
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 
JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)Graeme_IBM
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
Ibm edge computing meetup
Ibm edge computing meetupIbm edge computing meetup
Ibm edge computing meetupEric Cattoir
 
Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0Ewald Roodenrijs
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Strongback Consulting
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupIBM Danmark
 
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...mfrancis
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Leigh Williamson
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?Vmwareir
 
IBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBIZZ
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix
 

Similaire à Peuker, Neu: Enterprise Android for the Win (20)

Worklight mobile v6
Worklight mobile v6 Worklight mobile v6
Worklight mobile v6
 
Sarah CV 2016 External
Sarah CV 2016 ExternalSarah CV 2016 External
Sarah CV 2016 External
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app development
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 
JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)JVM Multitenancy (JavaOne 2012)
JVM Multitenancy (JavaOne 2012)
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Ibm edge computing meetup
Ibm edge computing meetupIbm edge computing meetup
Ibm edge computing meetup
 
Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0Test expo cloud-enabled testing services (wide)_v1.0
Test expo cloud-enabled testing services (wide)_v1.0
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin VittrupPCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
PCTY 2012, Tivoli Endpoint Manager v. Martin Vittrup
 
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
Enabling the Enterprise with Next-Generation Mobile Architectures - Mark Vand...
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
 
IBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with Worklight
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road ahead
 

Plus de Droidcon Berlin

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google castDroidcon Berlin
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limitsDroidcon Berlin
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility Droidcon Berlin
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_backDroidcon Berlin
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86Droidcon Berlin
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building AndroidDroidcon Berlin
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentationDroidcon Berlin
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Droidcon Berlin
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkraussDroidcon Berlin
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014Droidcon Berlin
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Droidcon Berlin
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidconDroidcon Berlin
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devicesDroidcon Berlin
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradioDroidcon Berlin
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon Berlin
 

Plus de Droidcon Berlin (20)

Droidcon de 2014 google cast
Droidcon de 2014   google castDroidcon de 2014   google cast
Droidcon de 2014 google cast
 
Android programming -_pushing_the_limits
Android programming -_pushing_the_limitsAndroid programming -_pushing_the_limits
Android programming -_pushing_the_limits
 
crashing in style
crashing in stylecrashing in style
crashing in style
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Android industrial mobility
Android industrial mobility Android industrial mobility
Android industrial mobility
 
Details matter in ux
Details matter in uxDetails matter in ux
Details matter in ux
 
From sensor data_to_android_and_back
From sensor data_to_android_and_backFrom sensor data_to_android_and_back
From sensor data_to_android_and_back
 
droidparts
droidpartsdroidparts
droidparts
 
new_age_graphics_android_x86
new_age_graphics_android_x86new_age_graphics_android_x86
new_age_graphics_android_x86
 
5 tips of monetization
5 tips of monetization5 tips of monetization
5 tips of monetization
 
Testing and Building Android
Testing and Building AndroidTesting and Building Android
Testing and Building Android
 
Matchinguu droidcon presentation
Matchinguu droidcon presentationMatchinguu droidcon presentation
Matchinguu droidcon presentation
 
Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3Cgm life sdk_droidcon_2014_v3
Cgm life sdk_droidcon_2014_v3
 
The artofcalabash peterkrauss
The artofcalabash peterkraussThe artofcalabash peterkrauss
The artofcalabash peterkrauss
 
Raesch, gries droidcon 2014
Raesch, gries   droidcon 2014Raesch, gries   droidcon 2014
Raesch, gries droidcon 2014
 
Android open gl2_droidcon_2014
Android open gl2_droidcon_2014Android open gl2_droidcon_2014
Android open gl2_droidcon_2014
 
20140508 quantified self droidcon
20140508 quantified self droidcon20140508 quantified self droidcon
20140508 quantified self droidcon
 
Tuning android for low ram devices
Tuning android for low ram devicesTuning android for low ram devices
Tuning android for low ram devices
 
Froyo to kit kat two years developing & maintaining deliradio
Froyo to kit kat   two years developing & maintaining deliradioFroyo to kit kat   two years developing & maintaining deliradio
Froyo to kit kat two years developing & maintaining deliradio
 
Droidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicroDroidcon2013 security genes_trendmicro
Droidcon2013 security genes_trendmicro
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Peuker, Neu: Enterprise Android for the Win

  • 1. Droidcon 2012 Enterprise Android – for the win? DroidCon 2012 Jan Peuker, Accenture Raoul Neu, Elca Informatik
  • 2. Droidcon 2012 «The purpose of an organization is to enable ordinary humans beings to do extraordinary things» Peter F. Drucker  Large Organizations have to strictly follow rules and laws  Very risk averse, very security and privacy aware  Rigid development standards and quality assurance  Large Organizations are internationally spread  IT as business enabler, not feature- but productivity-driven  IT usually outsourced – documentation and processes mandatory  We look at corporate internal applications
  • 3. Droidcon 2012 What makes Android so interesting for the enterprise? Captain Jean-Luc Picard: There's an aura around him. Lieutenant Geordi La Forge: Well, of course, he's an android.
  • 4. Droidcon 2012 Standards = Cost efficency
  • 5. Droidcon 2012 Challengers iOS Windows [mobile|embedded|CE|phone]  Very strong C-Level visibility,  Windows CE is the standard favorite in BYOD schemes mobile productivity platform  Very good enterprise  Broad range of rugged and features, particularly for hardware (SAM) secured devices update and hardware services  Very good enterprise features,  Strong device and mail encryption very strong Outlook integration  Development requires  WP 7 incompatible, Windows separate infrastructure Embedded 8 could be game-changer Most importantly, though, they care.
  • 6. Droidcon 2012 «I had a problem so I thought to use Java – now I have a ProblemFactory»
  • 7. Droidcon 2012 «We seek peaceful co-existence» Capt. Remmick or: Supporting multiple platforms  The right choice: Native, Hybrid or Cross-Platform  No silver bullet. Analyze your requirements & constraints.  MEAP: Advantages & Drawbacks  Pro’s in integration and governance. Con’s in usability and native features.
  • 8. Droidcon 2012 Native Code Thick Cross- Client Code Generator Rich Client VM / Runtime How much users actually like it* Hybrid App How much it Web fits enterprise Starter standards Web Client Generic Code Generic UI Native UI *) the uncanny valley, see http://martinfowler.com/bliki/CrossPlatformMobile.html
  • 9. «How can you be certain they're Droidcon 2012 receiving us?» Capt. Picard or: Supporting multiple devices  Blacklists vs Whitelists  Trusted Certificates vary between device/api/provider  API & Development Issues  HttpUrlConnection vs DefaultHttpClient  Different Bouncycastle algorithms and hardware security features  Missing XML validation  Licensing 3rd party software.  Best technical solution  Business model
  • 10. «Mr. Data, is that the trouble I Droidcon 2012 believe it is?» Capt. Picard or: Supporting multiple apps  Dealing with enterprise release and life cycles  Always be ready to release. Think of test environment and repositories  Intergalactic Continuous Integration  Not out of the box: strong & exotic hardware requirements  Missing Distribution Channels  Android stays behind its competitors
  • 12. Droidcon 2012 How do you manage the diversity of rules and guidelines in an enterprise?
  • 13. Droidcon 2012 «The bureaucratic mentality is the only constant in the universe» Dr. McCoy  Governance is key  Enterprises applications require transactions and accountability  Device state and user assignment must be maintainable  E-Mail, Clipboard, Intents and Caches often not properly secured  Security is key  Device Encryption and Application Safety are mandatory  Trusted context either via virtualization (BizzTrust, VMware) or encryption e.g. with hardware modules (3LM, Certgate, Ageto)  Tradeoff: Most sophisticated protection is not integrated in standard Android. Requires rooting, which itself is a security risk.
  • 14. Droidcon 2012 «One of the advantages of being a Captain is being able to ask for advice without necessarily having to take it.» Cpt. Kirk  Bring your own device (BYOD)  Most employees do not want complex device passwords or full control over their device and route all internet traffic over VPN*  Currently no distinction between Corporate/Private data (except for dual-boot or application-level encryption)  Rooting and malicious software must be recognized  Connectivity  Connectivity should usually established over secure channels  Android does not support Proxy Authentication, Wi-Fi configuration  Tethering and Bluetooth cannot be controlled *) Which, luckily, is currently impossible anyways
  • 15. Droidcon 2012 Missing features: What will the future bring?
  • 16. Droidcon 2012 «Reports of my assimilation have been greatly exaggerated» Cpt. Picard  Missing ecosystem features  Enterprise Market with CA for trusted applications  OTA Update API without Google account  Clear Chrome (Jelly Bean), Motorola and Samsung strategy  Understanding of enterprise features with app makers  Missing security features  MDM which supports user certificates, CA’s and network config  Wi-Fi Proxy Authentication, Full VPN routing, EAP-SIM  Real ASLR and storage encryption for corporate/private stores  E-Mail and Exchange features for S/MIME and two-factor auth  Robust Synchronization (SyncML), Robust Service and SSL API
  • 17. Droidcon 2012 Recap  Align to enterprise policies, prepare for non-market distribution  Embrace development standards, KPI’s and lifecycles  Thoroughly manage traceability, accountability and privacy  Prepare for integration using secure Webservices and XML  Prepare for fragmented device base and users who need to be supported by – in the end – yourself (incomprehensible pain)
  • 18. Droidcon 2012 May the force be with you. jan.peuker@accenture.com raoul.neu@elca.ch

Notes de l'éditeur

  1. Scenario: Native Apps for different Platforms3 Developers2 different HardwaresMISSING DISTRIBUTION CHANELSBETA TestingAndroidstraightforward BUT: reducesecurity + missingdistributioncontroliOSentreprise -> no securityloss, (ordeviceidcontrol)WP7 -> via marketplace