SlideShare une entreprise Scribd logo
1  sur  37
Demystifying the
Mobile Container
Part II: BYOD Security &
Management
© Copyright 2013 Antenna Software, Inc. All rights reserved.
Presented by:
Jim Somers
Chief Marketing & Strategy Officer
June 6, 2013
Confidential. Do not distribute.
WELCOME
Our Agenda:
2 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
• What is a mobile app "container?"
• What are the different types?
• What do they actually do?
• Why do we need them?
• What are good examples?
• Questions
Wanna hear this webinar LIVE?
Go to >> http://info.antennasoftware.com/MMWS-Library.html
WHAT WE DO
AMPchroma helps you build, run, and manage all your
mobile applications and content.
➦ Enabling you to get to market faster, have more
flexibility, and better manage risk in this ever-changing
mobile world.
3 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
ENTERPRISE-GRADE APP SAMPLES
44
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
Ticketing app for train conductors
Research library app Field Service app
Mobile shopping app
Field sales and distributors catalog appField Sales app
IT’S ALL VERY CONFUSING
© Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
Container
Sandbox
Partition
Hypervisor
Persona
Shell
Separation
Mode
Wrapper
Portal
Walled
Garden
Hub
Store
5
IT’S ALL VERY CONFUSING
© Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.6
DEVELOPMENT MANAGEMENT
IT’S ALL VERY CONFUSING
© Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.7
MARKET SITUATION
8 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
• IT administrators
want the security,
management &
control over their
devices, users & apps
MANAGEMENT
(MDM/MAM)
• It‟s where speed & usability …
• … converge with management
and control
• Developers want to
build apps quickly and
deploy them to users as
easily as possible.
DEVELOPMENT
(MEAP/MADP)
MARKET SITUATION
9 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
• IT administrators
want the security,
management &
control over their
devices, users & apps
MANAGEMENT
(MDM/MAM)
• Developers want to
build apps quickly and
deploy them to users as
easily as possible.
DEVELOPMENT
(MEAP/MADP)
• But buyer beware!
• Two solutions for 2 needs?
• Or are they?
MOBILE
DEVELOPMENT
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
THE HYBRID CLIENT
© Copyright 2013 Antenna Software, Inc. All rights reserved.
Device APIs
Client Tier
Native Container
HTML5, CSS, Ja
vaScript
Web Content
A native container allows developers to build apps that
look, feel, and function like native apps, without building native
apps.
Confidential. Do not distribute.
• HTML/CSS3
• JavaScript
• JavaScript
UI FW
• Enterprise-grade
• Reusability
• Device Portability
• Speed & Agility
11
TO LEARN MORE GO TO …
12 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
GO TO: http://bit.ly/Contain_This
MOBILE
MANAGEMENT
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
THE OTHER CONTAINER
Mobile
containerization
is the ability to
partition, manage
and secure data
locally or virtually on
a mobile device.*
14 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
* “Tech Overview of Mobile App Containers for Enterprise Data
Management & Security”, P, Redman, Gartner, 1/24/13
WHY DO WE NEED THEM?
Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
This is my
very own
device!
* Source: Gartner
WHY DO WE NEED THEM?
Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
This is my
very own
device!
70% of mobile
professionals will
conduct their work
on personal smart
devices by 2018.*
* Source: Gartner
WHY DO WE NEED THEM?
Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
This is my
very own
device!
70% of mobile
professionals will
conduct their work
on personal smart
devices by 2018.*
38% of companies
plan to stop providing
devices to workers by
2016 - rising to 50%
by 2017.*
* Source: Gartner
MDM CAPITALIZED ON THE TREND
• Crowded market with over 100
vendors, globally
• Estimated to be a $784M market
today, growing to $1.6B by 2014
• 30% penetrated in North America
• 65% revenue in NA; 17% in W.
Europe; single digits ROW
• 25% of sales in financial
services, with MFG, H/C & Gov‟t right
behind
• Over 70% sales are <500 seats
Mobile Device Management “Fun Facts”
18 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
* Source: Gartner “Magic Quadrant for Mobile Device Management Software” Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso, 5/23/13
TOO MUCH OF AN IRON FIST?
Employees have started voicing serious concerns with MDM
solutions – saying they‟re too intrusive and heavy-handed:
• Why do you need access to
the whole device?
• Why are you telling me I
can‟t use certain apps?
• Who owns the data/IP if I
leave?
• Who do I call for support?
19 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
PLAY
WORK
ENTER THE CONTAINER
20 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
How can I protect
the data in the apps
my employees use
for work …
… separated and
secure from the rest
of their personal
apps?
BEST OF BOTH WORLDS?
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
EMPLOYEE
“I can use my own device
for work and not feel like
„Big Brother‟ is always
watching me?”
IT DEPT
“I can have control over
the company data being
accessed from personally-
owned devices?”
1. Containers are effectively mobile apps that are loaded onto
devices much like the typical OS-based installation process
2. When a user opens the container, they are instructed to go
through an authentication process
3. Once authenticated, a virtual environment is launched
whereby “approved” apps are accessible to the end user
4. IT administrators control the apps and content through a
centralized management console
5. All apps and content used within the container are secured
and the data is encrypted
6. All apps and content outside the container do not have access
to the data store
HOW THEY WORK
22 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
DIFFERENT SECURITY MODELS
App App
App
Device
Lock Down
- Windows Mobile
- BlackBerry <10
App App
App App
App App
Separate
Spaces
- BlackBerry 10/Balance
- Samsung Knox
- AT&T Toggle
- MDM players
- MAM players
- AMPchroma
App App
App App
App App
App Specific
Security
App
App
App
23 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
VENDOR LANDSCAPE
MADP
MAM
Virtualization
Security
MDM
Mobile app development
platforms known mostly
for WODA & some
minimal MAM
Mobile application
management systems
to create and manage
enterprise app stores
Extending the
virtualization
technology used to
deliver desktop apps to
mobile devices
Security solutions
create separate work
& personal spaces on
BYO devices
Mobile device
management
platforms to
address BYOD
MOBILE
ENTERPRISE
24 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
• Secure container that communicates
with a client interface on the AMP
Server
• Management of multiple web apps via
single native container (patented)
• Enables real-time and offline
capabilities
• Built-in connectors and adapters
provide easy integration to backend
systems
AMP CLIENT POWERED BY AMPCHROMA
25 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
AMP CLIENT POWERED BY AMPCHROMA
26 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
• Provision and deploy pre-authorized HTML5 apps
within a single native client app
• IT controls distribution and management of apps for
employees
• Marketing controls distribution of branded apps
directly to consumers, bypassing app store
approvals
27 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
• Web console for remote
control of
apps, devices, users, and
content
• Role-based
administration
• Secure & control
corporate- or personally-
liable devices
• Patented technology for
automated remote
device security
MANAGER
AMP MANAGER POWERED BY AMPCHROMA
AMPCHROMA
360° SECURITY & MANAGEMENT
28 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
NEXUS OF DEVELOPMENT & MANAGEMENT
MDM
BYOD
Build
Fast
Open
Flexible
Manage
Secure
Controlled
Compliant
Container?
29 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
FROM THIS …
© Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
Container
Sandbox
Partition
Hypervisor
Persona
Shell
Separation
Mode
Wrapper
Portal
Walled
Garden
Hub
Store
30
Development Management
… TO THIS
© Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
Container
31
Containers provide
developers with a
fast, flexible and cost
effective approach for
building, deploying and
updating cross-
platform apps.
They also isolate the
company data from
other components on a
mobile device for greater
security and control in
an increasingly BYOD
world.
Mobile Field Service:
• Steris chose Hybrid – HTML5 inside secure
native container
• Users needed to view docs and capture
signatures in order to speed-up and simplify
the service order completion
• Migrated from laptops to iPhone & Android
• Integrated to Siebel & Kronos for time
keeping, and Active Directory for SSO
CUSTOMER EXAMPLE
32 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
© Copyright 2011 Antenna Software, Inc. All rights reserved.© Copyright 2012 Antenna Software, Inc. All rights reserved.
STERIS USE CASE
33
iPhone & Android 1,500 usersSiebel & Kronos
CLOSING THOUGHTS
• “Container” is a broad term and can mean different things to different people
• They help developers get their apps built and deployed faster
• They give IT the assurance that sensitive data will not commingle with personal data
• There are lot‟s of different options in the marketplace, which makes it difficult to
understand and appreciate their differences
• When evaluating the providers consider what their legacy agenda/perspective is
• Be sure to bring all parties to the table when selecting a container to make sure
everyone‟s needs are being heard
• Don‟t forget about the end user. Too much security and control can have an adverse
affect on end user satisfaction and productivity.
• The art is all this is finding the right balance of control vs. enablement
• Find a solution that enables the business to move quickly, but not at the cost of data
security
34 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
WHY ARE WE SO HAPPY?
75 of the F1000
brands rely on our
platform every
day, like
Coke, Walmart, Xe
rox, RBS and
McGraw Hill.
Gartner recognized us
as a LEADER in their
2012 Magic
Quadrant for Mobile
App Development
Platforms (MADP).
You‟d be smiling too if
you had over 200
million messages
flowing through your
servers each month.
Dozens of carrier and
ISV partners call our
platform their own and
take it to market
under their brand.
With our
SAS70, SysTrust &
FIPS140
certifications, we sleep
well knowing our
customers are secure.
35 © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
LIVE PROGRAM
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
Wanna hear this webinar LIVE?
Go to >> http://info.antennasoftware.com/MMWS-Library.html
FOLLOW ME AT …
© Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
@JimatAntenna
www.linkedin.com/in/jimatantenna

Contenu connexe

Tendances

Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardHitReach
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overviewDavid Scruggs
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarAmazon Web Services
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelDipesh Mukerji
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
Landmines for Open Source in the Mobile Space
Landmines for Open Source in the Mobile SpaceLandmines for Open Source in the Mobile Space
Landmines for Open Source in the Mobile SpaceRobert Sutor
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Next2 SMS Marketing Presentation
Next2 SMS Marketing PresentationNext2 SMS Marketing Presentation
Next2 SMS Marketing PresentationBrian Puckett
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Eating our own Dogfood - Twitter Mobile
Eating our own Dogfood - Twitter MobileEating our own Dogfood - Twitter Mobile
Eating our own Dogfood - Twitter Mobilelrechis
 
Rapidsoft SystemS Mobile Development Capabilities
Rapidsoft SystemS Mobile Development CapabilitiesRapidsoft SystemS Mobile Development Capabilities
Rapidsoft SystemS Mobile Development CapabilitiesSandeep Kumar
 
TADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovTADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovAlan Quayle
 

Tendances (20)

Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Intro to mobile technology
Intro to mobile technologyIntro to mobile technology
Intro to mobile technology
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
The Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry ForwardThe Connected Car: Driving the Industry Forward
The Connected Car: Driving the Industry Forward
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Mobile architecture overview
Mobile architecture overviewMobile architecture overview
Mobile architecture overview
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema Ghanekar
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-Channel
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
Landmines for Open Source in the Mobile Space
Landmines for Open Source in the Mobile SpaceLandmines for Open Source in the Mobile Space
Landmines for Open Source in the Mobile Space
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Next2 SMS Marketing Presentation
Next2 SMS Marketing PresentationNext2 SMS Marketing Presentation
Next2 SMS Marketing Presentation
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Eating our own Dogfood - Twitter Mobile
Eating our own Dogfood - Twitter MobileEating our own Dogfood - Twitter Mobile
Eating our own Dogfood - Twitter Mobile
 
Rapidsoft SystemS Mobile Development Capabilities
Rapidsoft SystemS Mobile Development CapabilitiesRapidsoft SystemS Mobile Development Capabilities
Rapidsoft SystemS Mobile Development Capabilities
 
Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012Hk enterprise mobility computerworld mar 2012
Hk enterprise mobility computerworld mar 2012
 
Mobile development capability doc
Mobile development capability docMobile development capability doc
Mobile development capability doc
 
TADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin IvanovTADS Telecom Summit Telestax Ivelin Ivanov
TADS Telecom Summit Telestax Ivelin Ivanov
 

Similaire à Demystifying Mobile Containers

Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ Kinjal Vora
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Why an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust APIWhy an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust APIManmohan Gupta
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API Software AG
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentationCA Technologies
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 

Similaire à Demystifying Mobile Containers (20)

Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ Simplifying Enterprise Mobility Terms - DronaHQ
Simplifying Enterprise Mobility Terms - DronaHQ
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Why an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust APIWhy an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust API
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API
 
Ca mdm marketing presentation
Ca mdm marketing presentationCa mdm marketing presentation
Ca mdm marketing presentation
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Ibm worklight
Ibm worklightIbm worklight
Ibm worklight
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Demystifying Mobile Containers

  • 1. Demystifying the Mobile Container Part II: BYOD Security & Management © Copyright 2013 Antenna Software, Inc. All rights reserved. Presented by: Jim Somers Chief Marketing & Strategy Officer June 6, 2013 Confidential. Do not distribute.
  • 2. WELCOME Our Agenda: 2 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • What is a mobile app "container?" • What are the different types? • What do they actually do? • Why do we need them? • What are good examples? • Questions Wanna hear this webinar LIVE? Go to >> http://info.antennasoftware.com/MMWS-Library.html
  • 3. WHAT WE DO AMPchroma helps you build, run, and manage all your mobile applications and content. ➦ Enabling you to get to market faster, have more flexibility, and better manage risk in this ever-changing mobile world. 3 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 4. ENTERPRISE-GRADE APP SAMPLES 44 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Ticketing app for train conductors Research library app Field Service app Mobile shopping app Field sales and distributors catalog appField Sales app
  • 5. IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container Sandbox Partition Hypervisor Persona Shell Separation Mode Wrapper Portal Walled Garden Hub Store 5
  • 6. IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.6
  • 7. DEVELOPMENT MANAGEMENT IT’S ALL VERY CONFUSING © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.7
  • 8. MARKET SITUATION 8 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • IT administrators want the security, management & control over their devices, users & apps MANAGEMENT (MDM/MAM) • It‟s where speed & usability … • … converge with management and control • Developers want to build apps quickly and deploy them to users as easily as possible. DEVELOPMENT (MEAP/MADP)
  • 9. MARKET SITUATION 9 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. • IT administrators want the security, management & control over their devices, users & apps MANAGEMENT (MDM/MAM) • Developers want to build apps quickly and deploy them to users as easily as possible. DEVELOPMENT (MEAP/MADP) • But buyer beware! • Two solutions for 2 needs? • Or are they?
  • 10. MOBILE DEVELOPMENT © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 11. THE HYBRID CLIENT © Copyright 2013 Antenna Software, Inc. All rights reserved. Device APIs Client Tier Native Container HTML5, CSS, Ja vaScript Web Content A native container allows developers to build apps that look, feel, and function like native apps, without building native apps. Confidential. Do not distribute. • HTML/CSS3 • JavaScript • JavaScript UI FW • Enterprise-grade • Reusability • Device Portability • Speed & Agility 11
  • 12. TO LEARN MORE GO TO … 12 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. GO TO: http://bit.ly/Contain_This
  • 13. MOBILE MANAGEMENT © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 14. THE OTHER CONTAINER Mobile containerization is the ability to partition, manage and secure data locally or virtually on a mobile device.* 14 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. * “Tech Overview of Mobile App Containers for Enterprise Data Management & Security”, P, Redman, Gartner, 1/24/13
  • 15. WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! * Source: Gartner
  • 16. WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! 70% of mobile professionals will conduct their work on personal smart devices by 2018.* * Source: Gartner
  • 17. WHY DO WE NEED THEM? Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. This is my very own device! 70% of mobile professionals will conduct their work on personal smart devices by 2018.* 38% of companies plan to stop providing devices to workers by 2016 - rising to 50% by 2017.* * Source: Gartner
  • 18. MDM CAPITALIZED ON THE TREND • Crowded market with over 100 vendors, globally • Estimated to be a $784M market today, growing to $1.6B by 2014 • 30% penetrated in North America • 65% revenue in NA; 17% in W. Europe; single digits ROW • 25% of sales in financial services, with MFG, H/C & Gov‟t right behind • Over 70% sales are <500 seats Mobile Device Management “Fun Facts” 18 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. * Source: Gartner “Magic Quadrant for Mobile Device Management Software” Phillip Redman, John Girard, Terrence Cosgrove, Monica Basso, 5/23/13
  • 19. TOO MUCH OF AN IRON FIST? Employees have started voicing serious concerns with MDM solutions – saying they‟re too intrusive and heavy-handed: • Why do you need access to the whole device? • Why are you telling me I can‟t use certain apps? • Who owns the data/IP if I leave? • Who do I call for support? 19 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 20. PLAY WORK ENTER THE CONTAINER 20 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. How can I protect the data in the apps my employees use for work … … separated and secure from the rest of their personal apps?
  • 21. BEST OF BOTH WORLDS? © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. EMPLOYEE “I can use my own device for work and not feel like „Big Brother‟ is always watching me?” IT DEPT “I can have control over the company data being accessed from personally- owned devices?”
  • 22. 1. Containers are effectively mobile apps that are loaded onto devices much like the typical OS-based installation process 2. When a user opens the container, they are instructed to go through an authentication process 3. Once authenticated, a virtual environment is launched whereby “approved” apps are accessible to the end user 4. IT administrators control the apps and content through a centralized management console 5. All apps and content used within the container are secured and the data is encrypted 6. All apps and content outside the container do not have access to the data store HOW THEY WORK 22 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 23. DIFFERENT SECURITY MODELS App App App Device Lock Down - Windows Mobile - BlackBerry <10 App App App App App App Separate Spaces - BlackBerry 10/Balance - Samsung Knox - AT&T Toggle - MDM players - MAM players - AMPchroma App App App App App App App Specific Security App App App 23 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 24. VENDOR LANDSCAPE MADP MAM Virtualization Security MDM Mobile app development platforms known mostly for WODA & some minimal MAM Mobile application management systems to create and manage enterprise app stores Extending the virtualization technology used to deliver desktop apps to mobile devices Security solutions create separate work & personal spaces on BYO devices Mobile device management platforms to address BYOD MOBILE ENTERPRISE 24 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 25. • Secure container that communicates with a client interface on the AMP Server • Management of multiple web apps via single native container (patented) • Enables real-time and offline capabilities • Built-in connectors and adapters provide easy integration to backend systems AMP CLIENT POWERED BY AMPCHROMA 25 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 26. AMP CLIENT POWERED BY AMPCHROMA 26 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. • Provision and deploy pre-authorized HTML5 apps within a single native client app • IT controls distribution and management of apps for employees • Marketing controls distribution of branded apps directly to consumers, bypassing app store approvals
  • 27. 27 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved. • Web console for remote control of apps, devices, users, and content • Role-based administration • Secure & control corporate- or personally- liable devices • Patented technology for automated remote device security MANAGER AMP MANAGER POWERED BY AMPCHROMA
  • 28. AMPCHROMA 360° SECURITY & MANAGEMENT 28 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 29. NEXUS OF DEVELOPMENT & MANAGEMENT MDM BYOD Build Fast Open Flexible Manage Secure Controlled Compliant Container? 29 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 30. FROM THIS … © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container Sandbox Partition Hypervisor Persona Shell Separation Mode Wrapper Portal Walled Garden Hub Store 30
  • 31. Development Management … TO THIS © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Container 31 Containers provide developers with a fast, flexible and cost effective approach for building, deploying and updating cross- platform apps. They also isolate the company data from other components on a mobile device for greater security and control in an increasingly BYOD world.
  • 32. Mobile Field Service: • Steris chose Hybrid – HTML5 inside secure native container • Users needed to view docs and capture signatures in order to speed-up and simplify the service order completion • Migrated from laptops to iPhone & Android • Integrated to Siebel & Kronos for time keeping, and Active Directory for SSO CUSTOMER EXAMPLE 32 Confidential. Do not distribute. © Copyright 2013 Antenna Software, Inc. All rights reserved.
  • 33. © Copyright 2011 Antenna Software, Inc. All rights reserved.© Copyright 2012 Antenna Software, Inc. All rights reserved. STERIS USE CASE 33 iPhone & Android 1,500 usersSiebel & Kronos
  • 34. CLOSING THOUGHTS • “Container” is a broad term and can mean different things to different people • They help developers get their apps built and deployed faster • They give IT the assurance that sensitive data will not commingle with personal data • There are lot‟s of different options in the marketplace, which makes it difficult to understand and appreciate their differences • When evaluating the providers consider what their legacy agenda/perspective is • Be sure to bring all parties to the table when selecting a container to make sure everyone‟s needs are being heard • Don‟t forget about the end user. Too much security and control can have an adverse affect on end user satisfaction and productivity. • The art is all this is finding the right balance of control vs. enablement • Find a solution that enables the business to move quickly, but not at the cost of data security 34 © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 35. WHY ARE WE SO HAPPY? 75 of the F1000 brands rely on our platform every day, like Coke, Walmart, Xe rox, RBS and McGraw Hill. Gartner recognized us as a LEADER in their 2012 Magic Quadrant for Mobile App Development Platforms (MADP). You‟d be smiling too if you had over 200 million messages flowing through your servers each month. Dozens of carrier and ISV partners call our platform their own and take it to market under their brand. With our SAS70, SysTrust & FIPS140 certifications, we sleep well knowing our customers are secure. 35 © Copyright 2012 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute.
  • 36. LIVE PROGRAM © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. Wanna hear this webinar LIVE? Go to >> http://info.antennasoftware.com/MMWS-Library.html
  • 37. FOLLOW ME AT … © Copyright 2013 Antenna Software, Inc. All rights reserved.Confidential. Do not distribute. @JimatAntenna www.linkedin.com/in/jimatantenna

Notes de l'éditeur

  1. On the positive side of the ledger, the enterprise mobility market matured (or exploded) in 2012. It came out of infancy and entered adolescence in certain respects. IT got much more involved – or was forced to get involved – which is great for Antenna as our core value has always resonated with the more technology-minded professionalsNative became sexy again, and enthusiasm for mobile web/HTML5/etc. became much more realistic as a result of a few tech juggernauts (e.g., Facebook) falling short of user expectations with their mobile web appsBut most importantly – what REALLY ignited this market – was the BYOD phenomenon. Unfortunately, Antenna and others of our MADP ilk were the immediate benefactors of this market tipping point. Instead, MDM players like A/W, Mobile Iron, Good, and others started printing money as IT groups began buying licenses en masse in a very knee-jerk manner for fear they would lose control (or possibly their jobs) if they didn’t get in front of this trend that had a life of its own.One the negative side of the ledger, while it’s hard to prove … anecdotally … the global economic crisis has certainly had in impact of buying patterns and investments in transformative technologies.But, what really affected us and caught us somewhat flat-footed was the wide use, adoption, implementation of free/open development toolsets. It put a spotlight on the fact that developers hold the keys in many respects and prefer to use the likes of Sencha, Jquery Mobile, PhoneGap to get to market quickly and inexpensively.
  2. So if SECURITY is the main difference, what are companies doing to protect themselves? With all the talk about BYOD and everybody having a smartphone and everybody accessing company data from their personal devices there’s definitely opportunity for chaos and confusion and frustration. But IT departments and mobile software vendors and app developers have actually come up with some pretty clever solutions to the security challenge.This slide represents not just three different alternatives to mobile security, but almost a timeline of how security services have evolved and will probably continue to evolve.In the old days, like 5 or 6 years ago, people that use smart mobile devices for work probably got their device from their employer. And it was designated a company asset, like your laptop, and it was completely controlled by the IT department. So, you got your Windows Mobile device or your BlackBerry and, sure, you could make a personal phone call once in a while, but you didn’t have a lot of control over the software loaded on the device itself. And this gave IT a lot of control and peace of mind.But as BYOD became more popular and people started bringing their own smartphones and tablets to work, companies had to find a way to have control over some apps while not intruding on the apps that belong to the device owner, or employee. And so you see some creative solutions like separate spaces on the same device, or apps wrapped in a secure container.BlackBerry recently released BlackBerry 10 and one of the really compelling features is something called BlackBerry Balance ….
  3. On the positive side of the ledger, the enterprise mobility market matured (or exploded) in 2012. It came out of infancy and entered adolescence in certain respects. IT got much more involved – or was forced to get involved – which is great for Antenna as our core value has always resonated with the more technology-minded professionalsNative became sexy again, and enthusiasm for mobile web/HTML5/etc. became much more realistic as a result of a few tech juggernauts (e.g., Facebook) falling short of user expectations with their mobile web appsBut most importantly – what REALLY ignited this market – was the BYOD phenomenon. Unfortunately, Antenna and others of our MADP ilk were the immediate benefactors of this market tipping point. Instead, MDM players like A/W, Mobile Iron, Good, and others started printing money as IT groups began buying licenses en masse in a very knee-jerk manner for fear they would lose control (or possibly their jobs) if they didn’t get in front of this trend that had a life of its own.One the negative side of the ledger, while it’s hard to prove … anecdotally … the global economic crisis has certainly had in impact of buying patterns and investments in transformative technologies.But, what really affected us and caught us somewhat flat-footed was the wide use, adoption, implementation of free/open development toolsets. It put a spotlight on the fact that developers hold the keys in many respects and prefer to use the likes of Sencha, Jquery Mobile, PhoneGap to get to market quickly and inexpensively.