SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Over recent years, small
and large businesses alike
have seen the
proliferation of mobile
applications accessing
enterprise data. These
applications are either
introduced by employees
through word of mouth or
developed by internal
teams without further
coordination. This trend is
compounded by an
increasing push from
employees to use their
personal mobile devices to
access enterprise data.
This paper describes the
approach AIQ takes to
securely manage and
protect enterprise data.
SECURING MOBILE
ACCESS
TO ENTERPRISE
DATA
An Appear Whitepaper
SECURITYPOSITIONINGWHITEPAPER
1
Introduction
Over recent years, small and large businesses alike have seen the proliferation of mobile
applications accessing enterprise data. These applications are either introduced by employees
through word of mouth or developed by internal teams without further coordination. This
trend is comforted by an increasing push from employees to use their personal mobile devices
to access enterprise data.
Analysts agree that businesses should embrace these trends rather than work against them,
as they can increase employees' productivity and job satisfaction as well as ensure a higher
quality of service and improve compliance with regulations in place. In the Forrester report
"How Consumerization Drives Innovation", Ted Schadler, vice-president and principal analyst
at Forrester Research, confirms: "Allowing employees to use available devices and
applications is a key driver to solve new customer and business problems". However, the
availability of enterprise data in the field is extending the boundaries of businesses' IT
infrastructures and adds additional risks and strains on the IT departments.
At Appear we are convinced that businesses will be better equipped to succeed when
empowering their employees with devices, applications and data that match their needs.
However, it is critical that enterprise data remains carefully managed and secured. To achieve
this, businesses need more than legacy mobile device management (MDM) solutions. Today,
businesses need the ability to promptly address the requirements for new mobile solutions,
which may be initiated by customers, employees or competitors. This requires an
infrastructure to quickly and securely build, integrate and deliver to market new mobile
solutions that will allow those businesses to adjust to fast moving competitive landscapes.
At Appear, we develop the Appear IQ (AIQ) mobility platform, which enables businesses to
securely build, integrate and manage enterprise mobile applications. Keeping information
secure on mobile devices is critical for any business. Because all data is important, the
platform has been built to maintain a high level of security without compromising the user
experience. The AIQ platform has been designed with security at its core. This document
describes the approach AIQ takes to securely manage and protect enterprise data.
SECURITYPOSITIONINGWHITEPAPER
2
Appear IQ Architecture
The Appear IQ Mobility Platform simplifies the development and management of mobile
applications, as well as their integration with enterprise systems. It enhances the creation of
secure application portfolios through the following key functionality.
Secure mobile application development
Communication frameworks
The platform offers synchronous and asynchronous frameworks (including data
synchronization and messaging) which abstract connectivity and integration challenges.
The platform's asynchronous frameworks ensure that the relevant data is securely available
on the device, ready for consumption by authorized mobile applications. This guarantees full
offline functionality in a secure manner, which is critical for the successful introduction of
mobile applications.
The platform's synchronous frameworks guarantee that all communications to backend
enterprise systems are securely tunnelled through the platform.
Cross platform applications
The platform simplifies the development of cross-platform1
applications using a hybrid2
architecture.
Secure application deployment
User management
The platform integrates with enterprise directory services to authenticate and authorize
mobile and back-office users based on corporate policies.
App management
The platform simplifies the approval, distribution and removal of cross-platform mobile
applications.
Secure and scalable delivery model
The development and management platforms are normally available as a service using
Appear’s public or private clouds, which reduces deployment costs, infrastructure investment
and reduces update complexity.
For customers that require more control, the platform can also be deployed outside the
Appear clouds in a more traditional private IT environment.
Appear IQ key components
Figure 1 below depicts the key components of the platform.
1
Cross-platform applications are applications developed once, and available
across different operating systems like Android, iOS and Windows Phone. This
significantly shortens the development times required to support different
devices and manufacturers.
2
Hybrid applications combine different technologies. At Appear, we enrich
cross-platform web applications with additional functionality exposed by the
platform or the underlying hardware. This combines the portability of mobile
web applications with the performance and functionality of a native layer.
SECURITYPOSITIONINGWHITEPAPER
3
FIGURE 1 - APPEAR IQ HIGH LEVEL ARCHITECTURE
The key components of the Appear IQ mobility platform are:
Mobility platform
The Mobility Platform offers an administrative console which allows authorized administrative
users to manage mobile and back-office users, applications and devices in a secure
environment. In addition, it connects mobile applications with enterprise systems by
managing data to/from mobile devices and terminating the communication frameworks.
It is available as a hosted service, or on-premise.
Integration adapter
The integration adapter (IA) enables the interworking between the AIQ mobility platform and
the back end systems within the organisation’s IT infrastructure. It is responsible for securely
adjusting the data coming to/from the enterprise systems in a mobile friendly format, and
then distributing it to mobile devices through the Mobility Platform.
It is an optional component, typically dedicated to each customer. The integration adapter
can be deployed within Appear public and private clouds, as well as in on-premise
deployments embedded as OEM component to software products.
Mobile app container
The mobile app container is a native application installed on mobile devices. It is responsible
for securely managing data, applications and policies configured in the Mobility Platform. It
also includes a user interface, from which mobile users can access their enterprise application
portfolio.
SECURITYPOSITIONINGWHITEPAPER
4
User Authentication and Authorization
Any user that needs to access enterprise data must be authenticated and authorized.
The Mobility Platform integrates with enterprise directory services to authenticate mobile and
back-office users as well as extract profile information that can be used to define permissions
on resources3
within the deployment.
Table 1 below lists the supported directory services.
Supported Directory Service Notes
Microsoft Active Directory Windows 2008 Server and later.
Generic LDAP Directory Support for LDAP v3 directory servers.
Internal Directory User directory available within the Mobility
Platform.
Custom Directory Developers can develop custom plugins to
integrate with other directory services as of
Q4 2014.
TABLE 1 - LIST OF SUPPORTED DIRECTORY SERVICES
User authentication and profile extraction
The Mobility Platform can authenticate mobile users against enterprise directory services and
extract relevant profile information. Upon successful authentication, this profile information
can be stored in the platform to alleviate further administrative activities (ie. user group
management, fine grained permissions management).
User and profile synchronization
The Mobility Platform can be configured to replicate a sub-part of an enterprise directory
service in order to alleviate administrative activities. This allows the pre-loading of mobile and
back-office users in the platform prior to their initial enrolment. In this case, the user
authentication remains delegated to the enterprise directory service.
User authorization
The Mobility Platform allows authorized administrators to define user roles and link them to
permissions on system resources.
Roles can be assigned to user groups or individual users. Permissions define the accessibility
of resources within the deployment.
3
A resource can be a component ie. mobile, administrative user interface; or a
functionality ie. mobile application, sub-part of the platform's administrative
user interface.
SECURITYPOSITIONINGWHITEPAPER
5
Secure Application Management
Over recent years, the consumerization of enterprise mobility trend has led to a proliferation
of new applications that increasingly need to access enterprise data. This is adding
tremendous pressure on IT departments to standardize and support new applications,
guarantee their compliance as well as make them easily available to employees.
Mobile application management
The Appear IQ platform includes Mobile Application Management (MAM), which simplifies
the unified management of standalone and legacy applications as well as the development
and integration of new ones. This provides IT departments with full control over the lifecycle
of their chosen applications, avoiding the unreliable, lengthy and distracting approval
processes from public consumer app stores.
Role-based application distribution
The platform allows for role-based application distribution. Applications are distributed and
made available only to authorized users, defined through the Appear IQ platform. Access is
granted to all applications that match the users' assigned roles, either based on their group
membership or their individual assignment.
From there on, employees no longer need to look for the relevant applications, they are made
easily discoverable through the Appear Click&Run® technology.
Enabling in-application permissions
Lastly, the platform exposes users' permissions as well as context information to applications,
which can adjust their behavior accordingly.
Data Confidentiality and Integrity
For any business, confidentiality and integrity of enterprise data is critical. For that reason, the
Appear IQ mobility platform ensures the encryption of the data end to end.
Secure data on devices
Data at rest on the device is sandboxed within the Mobile App Container. All enterprise data
and HTML5 applications are managed by the Mobile App Container and held securely in a
database residing within it.
The Mobile App Container makes sure that enterprise data is available to authorized
applications only. The container ensures the isolation of enterprise data and restricts access
of HTML5 applications to the subset on which they have the rights. The sandbox also ensures
that data stored on the file systems is not directly accessible to unauthorized applications.
In addition, the Mobile App Container can be configured to add an additional layer of 256-bit
AES encryption of the database files. When enabled, cryptographic keys are stored in the
operating system's secure KeyChain and KeyStore.
SECURITYPOSITIONINGWHITEPAPER
6
The Mobile App Container makes use of the Address Space Layout Randomization (ASLR)
functionality that protects against malicious access to data loaded in memory4
.
Lastly, Mobile App Containers for Android and Windows Phone can be configured to use
external storage. In this case, it can be configured to automatically encrypt data stored at this
location. With that said, Appear recommend against storing sensitive data on these media.
Secure data in motion
Data in motion between the device and the mobility platform, or between the mobility
platform and the backend (possibly represented by the Integration Adapter) are transferred
over HTTPS. The Appear IQ Mobility Platform requires by default TLS v1.2 for encrypted
communications with both mobile (128-bit key) and backend components (128-bit or 256-bit
key).
Besides, the Appear IQ Public and Private clouds can host dedicated JVM-based Integration
Adapters (IA), on behalf of the businesses. Assuming the IA requires connectivity with
businesses' enterprise systems, communications can be encrypted using TLS v1.2.
Alternatively, a dedicated SSL tunnel can be established between the IA and the businesses'
datacenter.
Secure data in the platform
The platform allows businesses to keep full control over what data will be stored in the
Mobility Platform, and what data shall only securely transit through it.
Data at rest in the Mobility Platform is stored in a central database, which has access
restricted to the Mobility Platform at the network level.
The central database is provided by our cloud hosting partner. Please refer to the section
Cloud Compliance for a list of the certifications and attestations of our hosting partner. Both
the default Appear IQ Public and Private clouds are hosted within the EU zone and fall under
EU data privacy regulations. Alternative locations are possible for setting up Appear IQ Private
clouds.
In addition, when using the Appear IQ Private cloud, businesses can decide to enable SSL
encryption between the Mobility Platform and the database.
Lastly, the Appear IQ Mobility Platform is security hardened. Our security experts are
continuously monitoring and addressing possible security risks found or publicly announced in
underlying components.
4
ASLR is available on all supported iOS devices, Android devices running
Android 4.0 and later.
SECURITYPOSITIONINGWHITEPAPER
7
Cloud Compliance
At time of writing, the Appear IQ Public and Private Clouds are deployed in Amazon AWS. The
default Appear IQ Public and Private clouds are hosted in Ireland. Alternative locations are
possible for setting up Appear IQ Private clouds.
The Amazon AWS infrastructure has been designed and is managed in alignment with industry
regulations, standards and best practices. Table 2 lists the third party attestations, reports and
certifications that have been officially granted to the infrastructure. Please contact your
Appear representative to access the official attestations.
Certifications Notes
HIPAA For entities and their business associates subject to the U.S.
Health Insurance Portability and Accountability Act (HIPAA).
SOC 1/SSAE 16/ISAE 3402
(formerly SAS70)
The SOC 1 report audit attests that the control objectives are
appropriately designed and that the controls safeguarding
customer data are operating effectively.
SOC 2 The SOC 2 is an evaluation of the design and operating
effectiveness of controls that meet the criteria for the security
principle set forth in the AICPA’s Trust Services Principles
criteria. This report provides additional transparency into the
security based on a defined industry standard and further
demonstrates AWS’ commitment to protecting customer data.
SOC 3 The SOC 3 report is a publically-available summary of the SOC
2 report and provides the AICPA SysTrust Security Seal. The
report includes the external auditor’s opinion of the operation
of controls (based on the AICPA’s Security Trust Principles
included in the SOC 2 report).
PCI DSS Level 1 The attestation confirms that the infrastructure has been
successfully validated against standards applicable to a Level 1
service provider under PCI DSS Version 2.0.
ISO 27001 ISO 27001 is a widely-adopted global security standard that
outlines the requirements for information security
management systems. It provides a systematic approach to
managing company and customer information that’s based on
periodic risk assessments.
TABLE 2 - LIST OF CERTIFICATIONS AND ATTESTATIONS OF OUR PUBLIC AND PRIVATE CLOUDS
SECURITYPOSITIONINGWHITEPAPER
8
Appear Networks Systems AB, Kista Science Tower, 164 51 Kista, Sweden
Phone: +46(0)854591370 Web: www.appearnetworks.com
contact info@appearnetworks.com

Contenu connexe

Tendances

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solutionroshanjk
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementSoftweb Solutions
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Jae Hak Lee
 
Mobile enterprise application platforms : MEAP
Mobile enterprise application platforms : MEAPMobile enterprise application platforms : MEAP
Mobile enterprise application platforms : MEAPSoftweb Solutions
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelNirmal Misra
 
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...RapidValue
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
Oracle Scene Oct 2017
Oracle Scene Oct 2017Oracle Scene Oct 2017
Oracle Scene Oct 2017Alice Cantu
 

Tendances (18)

Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Key Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility SolutionKey Architectural Aspects of a Enterprise Mobility Solution
Key Architectural Aspects of a Enterprise Mobility Solution
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
AppWorks_ExecutiveBrief
AppWorks_ExecutiveBriefAppWorks_ExecutiveBrief
AppWorks_ExecutiveBrief
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise management
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025
 
Mobile enterprise application platforms : MEAP
Mobile enterprise application platforms : MEAPMobile enterprise application platforms : MEAP
Mobile enterprise application platforms : MEAP
 
Mobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next LevelMobile Device Management: Taking Conainerisation to the Next Level
Mobile Device Management: Taking Conainerisation to the Next Level
 
EMM Product Sales Deck
EMM Product Sales DeckEMM Product Sales Deck
EMM Product Sales Deck
 
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
 
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
VMworld 2013: Integrating Enterprise Application with SAML to VMware Horizon ...
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Oracle Scene Oct 2017
Oracle Scene Oct 2017Oracle Scene Oct 2017
Oracle Scene Oct 2017
 

En vedette

How to build integrated, professional enterprise-grade cross-platform mobile ...
How to build integrated, professional enterprise-grade cross-platform mobile ...How to build integrated, professional enterprise-grade cross-platform mobile ...
How to build integrated, professional enterprise-grade cross-platform mobile ...Appear
 
Appear IQ8 - Mobility. Made Simple. What we do
Appear IQ8 - Mobility. Made Simple. What we doAppear IQ8 - Mobility. Made Simple. What we do
Appear IQ8 - Mobility. Made Simple. What we doAppear
 
Appear IQ - Tutorials Backbone.js
Appear IQ - Tutorials Backbone.jsAppear IQ - Tutorials Backbone.js
Appear IQ - Tutorials Backbone.jsAppear
 
Appear IQ The Business Case for hybrid html5 mobile apps
Appear IQ The Business Case for hybrid html5 mobile appsAppear IQ The Business Case for hybrid html5 mobile apps
Appear IQ The Business Case for hybrid html5 mobile appsAppear
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English Appear
 
Improving the efficiency of aircraft turnaround
Improving the efficiency of aircraft turnaroundImproving the efficiency of aircraft turnaround
Improving the efficiency of aircraft turnaroundAppear
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middlewareClaudio Fiandrino
 

En vedette (7)

How to build integrated, professional enterprise-grade cross-platform mobile ...
How to build integrated, professional enterprise-grade cross-platform mobile ...How to build integrated, professional enterprise-grade cross-platform mobile ...
How to build integrated, professional enterprise-grade cross-platform mobile ...
 
Appear IQ8 - Mobility. Made Simple. What we do
Appear IQ8 - Mobility. Made Simple. What we doAppear IQ8 - Mobility. Made Simple. What we do
Appear IQ8 - Mobility. Made Simple. What we do
 
Appear IQ - Tutorials Backbone.js
Appear IQ - Tutorials Backbone.jsAppear IQ - Tutorials Backbone.js
Appear IQ - Tutorials Backbone.js
 
Appear IQ The Business Case for hybrid html5 mobile apps
Appear IQ The Business Case for hybrid html5 mobile appsAppear IQ The Business Case for hybrid html5 mobile apps
Appear IQ The Business Case for hybrid html5 mobile apps
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English
 
Improving the efficiency of aircraft turnaround
Improving the efficiency of aircraft turnaroundImproving the efficiency of aircraft turnaround
Improving the efficiency of aircraft turnaround
 
Distributed systems and middleware
Distributed systems and middlewareDistributed systems and middleware
Distributed systems and middleware
 

Similaire à Secure Mobile Access to Enterprise Data

Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsAlex Zaltsman
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceTricia Stream
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsDMIMarketing
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfAnil
 
8 tips to consider while creating an Enterprise App.pdf
8 tips to consider while creating an Enterprise App.pdf8 tips to consider while creating an Enterprise App.pdf
8 tips to consider while creating an Enterprise App.pdfWhitelotus Corporation
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...DMIMarketing
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Flexera Software App Portal
Flexera Software App PortalFlexera Software App Portal
Flexera Software App PortalFlexera
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfXDuce Corporation
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
App cloud bdm days apac
App cloud bdm days apacApp cloud bdm days apac
App cloud bdm days apacChris Thomas
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlTech Mahindra
 

Similaire à Secure Mobile Access to Enterprise Data (20)

Mobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platformsMobilizing Enterprise Data for mobile apps and platforms
Mobilizing Enterprise Data for mobile apps and platforms
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Overview_02-09-16_Digital Workspace
Overview_02-09-16_Digital WorkspaceOverview_02-09-16_Digital Workspace
Overview_02-09-16_Digital Workspace
 
行動應用App管理 (MAM)
行動應用App管理 (MAM) 行動應用App管理 (MAM)
行動應用App管理 (MAM)
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise AppsEssential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
Essential Guide to Becoming A Mobile App Rock Star - part III - Enterprise Apps
 
How Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdfHow Can Your Organization Benefit From Application Modernization_.pdf
How Can Your Organization Benefit From Application Modernization_.pdf
 
8 tips to consider while creating an Enterprise App.pdf
8 tips to consider while creating an Enterprise App.pdf8 tips to consider while creating an Enterprise App.pdf
8 tips to consider while creating an Enterprise App.pdf
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
Essential Guide to Becoming A Mobile App Rock Star - part III - Consumer-faci...
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Flexera Software App Portal
Flexera Software App PortalFlexera Software App Portal
Flexera Software App Portal
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
How Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdfHow Can Enterprise App Development Help Your Business Growth.pdf
How Can Enterprise App Development Help Your Business Growth.pdf
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
App cloud bdm days apac
App cloud bdm days apacApp cloud bdm days apac
App cloud bdm days apac
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 

Plus de Appear

Webinar 5 challenges of mobilization april 9 2014
Webinar   5 challenges of mobilization april 9 2014Webinar   5 challenges of mobilization april 9 2014
Webinar 5 challenges of mobilization april 9 2014Appear
 
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-Mitarbeiter
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-MitarbeiterMobiCloud Transport Webinar Series - Die vernetzten ÖPNV-Mitarbeiter
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-MitarbeiterAppear
 
Webinar: Learn how to migrate mobile workers to next generation mobility
Webinar: Learn how to migrate mobile workers to next generation mobilityWebinar: Learn how to migrate mobile workers to next generation mobility
Webinar: Learn how to migrate mobile workers to next generation mobilityAppear
 
Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Appear
 
Integrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction IndustryIntegrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction IndustryAppear
 
Gartner Catalyst: MobiCloud presentation
Gartner Catalyst: MobiCloud presentationGartner Catalyst: MobiCloud presentation
Gartner Catalyst: MobiCloud presentationAppear
 
MobiCloud Transport Webinar series June 2013 - Dutch
MobiCloud Transport Webinar series June 2013 - DutchMobiCloud Transport Webinar series June 2013 - Dutch
MobiCloud Transport Webinar series June 2013 - DutchAppear
 
MobiCloud Transport Webinar series June 2013 - Swedish
MobiCloud Transport Webinar series June 2013 - SwedishMobiCloud Transport Webinar series June 2013 - Swedish
MobiCloud Transport Webinar series June 2013 - SwedishAppear
 

Plus de Appear (8)

Webinar 5 challenges of mobilization april 9 2014
Webinar   5 challenges of mobilization april 9 2014Webinar   5 challenges of mobilization april 9 2014
Webinar 5 challenges of mobilization april 9 2014
 
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-Mitarbeiter
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-MitarbeiterMobiCloud Transport Webinar Series - Die vernetzten ÖPNV-Mitarbeiter
MobiCloud Transport Webinar Series - Die vernetzten ÖPNV-Mitarbeiter
 
Webinar: Learn how to migrate mobile workers to next generation mobility
Webinar: Learn how to migrate mobile workers to next generation mobilityWebinar: Learn how to migrate mobile workers to next generation mobility
Webinar: Learn how to migrate mobile workers to next generation mobility
 
Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.Webinar: The Enterrpise Appstore - What is it and why you need it.
Webinar: The Enterrpise Appstore - What is it and why you need it.
 
Integrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction IndustryIntegrating Mobile Technology in the Construction Industry
Integrating Mobile Technology in the Construction Industry
 
Gartner Catalyst: MobiCloud presentation
Gartner Catalyst: MobiCloud presentationGartner Catalyst: MobiCloud presentation
Gartner Catalyst: MobiCloud presentation
 
MobiCloud Transport Webinar series June 2013 - Dutch
MobiCloud Transport Webinar series June 2013 - DutchMobiCloud Transport Webinar series June 2013 - Dutch
MobiCloud Transport Webinar series June 2013 - Dutch
 
MobiCloud Transport Webinar series June 2013 - Swedish
MobiCloud Transport Webinar series June 2013 - SwedishMobiCloud Transport Webinar series June 2013 - Swedish
MobiCloud Transport Webinar series June 2013 - Swedish
 

Dernier

Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 

Dernier (20)

Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 

Secure Mobile Access to Enterprise Data

  • 1. Over recent years, small and large businesses alike have seen the proliferation of mobile applications accessing enterprise data. These applications are either introduced by employees through word of mouth or developed by internal teams without further coordination. This trend is compounded by an increasing push from employees to use their personal mobile devices to access enterprise data. This paper describes the approach AIQ takes to securely manage and protect enterprise data. SECURING MOBILE ACCESS TO ENTERPRISE DATA An Appear Whitepaper
  • 2. SECURITYPOSITIONINGWHITEPAPER 1 Introduction Over recent years, small and large businesses alike have seen the proliferation of mobile applications accessing enterprise data. These applications are either introduced by employees through word of mouth or developed by internal teams without further coordination. This trend is comforted by an increasing push from employees to use their personal mobile devices to access enterprise data. Analysts agree that businesses should embrace these trends rather than work against them, as they can increase employees' productivity and job satisfaction as well as ensure a higher quality of service and improve compliance with regulations in place. In the Forrester report "How Consumerization Drives Innovation", Ted Schadler, vice-president and principal analyst at Forrester Research, confirms: "Allowing employees to use available devices and applications is a key driver to solve new customer and business problems". However, the availability of enterprise data in the field is extending the boundaries of businesses' IT infrastructures and adds additional risks and strains on the IT departments. At Appear we are convinced that businesses will be better equipped to succeed when empowering their employees with devices, applications and data that match their needs. However, it is critical that enterprise data remains carefully managed and secured. To achieve this, businesses need more than legacy mobile device management (MDM) solutions. Today, businesses need the ability to promptly address the requirements for new mobile solutions, which may be initiated by customers, employees or competitors. This requires an infrastructure to quickly and securely build, integrate and deliver to market new mobile solutions that will allow those businesses to adjust to fast moving competitive landscapes. At Appear, we develop the Appear IQ (AIQ) mobility platform, which enables businesses to securely build, integrate and manage enterprise mobile applications. Keeping information secure on mobile devices is critical for any business. Because all data is important, the platform has been built to maintain a high level of security without compromising the user experience. The AIQ platform has been designed with security at its core. This document describes the approach AIQ takes to securely manage and protect enterprise data.
  • 3. SECURITYPOSITIONINGWHITEPAPER 2 Appear IQ Architecture The Appear IQ Mobility Platform simplifies the development and management of mobile applications, as well as their integration with enterprise systems. It enhances the creation of secure application portfolios through the following key functionality. Secure mobile application development Communication frameworks The platform offers synchronous and asynchronous frameworks (including data synchronization and messaging) which abstract connectivity and integration challenges. The platform's asynchronous frameworks ensure that the relevant data is securely available on the device, ready for consumption by authorized mobile applications. This guarantees full offline functionality in a secure manner, which is critical for the successful introduction of mobile applications. The platform's synchronous frameworks guarantee that all communications to backend enterprise systems are securely tunnelled through the platform. Cross platform applications The platform simplifies the development of cross-platform1 applications using a hybrid2 architecture. Secure application deployment User management The platform integrates with enterprise directory services to authenticate and authorize mobile and back-office users based on corporate policies. App management The platform simplifies the approval, distribution and removal of cross-platform mobile applications. Secure and scalable delivery model The development and management platforms are normally available as a service using Appear’s public or private clouds, which reduces deployment costs, infrastructure investment and reduces update complexity. For customers that require more control, the platform can also be deployed outside the Appear clouds in a more traditional private IT environment. Appear IQ key components Figure 1 below depicts the key components of the platform. 1 Cross-platform applications are applications developed once, and available across different operating systems like Android, iOS and Windows Phone. This significantly shortens the development times required to support different devices and manufacturers. 2 Hybrid applications combine different technologies. At Appear, we enrich cross-platform web applications with additional functionality exposed by the platform or the underlying hardware. This combines the portability of mobile web applications with the performance and functionality of a native layer.
  • 4. SECURITYPOSITIONINGWHITEPAPER 3 FIGURE 1 - APPEAR IQ HIGH LEVEL ARCHITECTURE The key components of the Appear IQ mobility platform are: Mobility platform The Mobility Platform offers an administrative console which allows authorized administrative users to manage mobile and back-office users, applications and devices in a secure environment. In addition, it connects mobile applications with enterprise systems by managing data to/from mobile devices and terminating the communication frameworks. It is available as a hosted service, or on-premise. Integration adapter The integration adapter (IA) enables the interworking between the AIQ mobility platform and the back end systems within the organisation’s IT infrastructure. It is responsible for securely adjusting the data coming to/from the enterprise systems in a mobile friendly format, and then distributing it to mobile devices through the Mobility Platform. It is an optional component, typically dedicated to each customer. The integration adapter can be deployed within Appear public and private clouds, as well as in on-premise deployments embedded as OEM component to software products. Mobile app container The mobile app container is a native application installed on mobile devices. It is responsible for securely managing data, applications and policies configured in the Mobility Platform. It also includes a user interface, from which mobile users can access their enterprise application portfolio.
  • 5. SECURITYPOSITIONINGWHITEPAPER 4 User Authentication and Authorization Any user that needs to access enterprise data must be authenticated and authorized. The Mobility Platform integrates with enterprise directory services to authenticate mobile and back-office users as well as extract profile information that can be used to define permissions on resources3 within the deployment. Table 1 below lists the supported directory services. Supported Directory Service Notes Microsoft Active Directory Windows 2008 Server and later. Generic LDAP Directory Support for LDAP v3 directory servers. Internal Directory User directory available within the Mobility Platform. Custom Directory Developers can develop custom plugins to integrate with other directory services as of Q4 2014. TABLE 1 - LIST OF SUPPORTED DIRECTORY SERVICES User authentication and profile extraction The Mobility Platform can authenticate mobile users against enterprise directory services and extract relevant profile information. Upon successful authentication, this profile information can be stored in the platform to alleviate further administrative activities (ie. user group management, fine grained permissions management). User and profile synchronization The Mobility Platform can be configured to replicate a sub-part of an enterprise directory service in order to alleviate administrative activities. This allows the pre-loading of mobile and back-office users in the platform prior to their initial enrolment. In this case, the user authentication remains delegated to the enterprise directory service. User authorization The Mobility Platform allows authorized administrators to define user roles and link them to permissions on system resources. Roles can be assigned to user groups or individual users. Permissions define the accessibility of resources within the deployment. 3 A resource can be a component ie. mobile, administrative user interface; or a functionality ie. mobile application, sub-part of the platform's administrative user interface.
  • 6. SECURITYPOSITIONINGWHITEPAPER 5 Secure Application Management Over recent years, the consumerization of enterprise mobility trend has led to a proliferation of new applications that increasingly need to access enterprise data. This is adding tremendous pressure on IT departments to standardize and support new applications, guarantee their compliance as well as make them easily available to employees. Mobile application management The Appear IQ platform includes Mobile Application Management (MAM), which simplifies the unified management of standalone and legacy applications as well as the development and integration of new ones. This provides IT departments with full control over the lifecycle of their chosen applications, avoiding the unreliable, lengthy and distracting approval processes from public consumer app stores. Role-based application distribution The platform allows for role-based application distribution. Applications are distributed and made available only to authorized users, defined through the Appear IQ platform. Access is granted to all applications that match the users' assigned roles, either based on their group membership or their individual assignment. From there on, employees no longer need to look for the relevant applications, they are made easily discoverable through the Appear Click&Run® technology. Enabling in-application permissions Lastly, the platform exposes users' permissions as well as context information to applications, which can adjust their behavior accordingly. Data Confidentiality and Integrity For any business, confidentiality and integrity of enterprise data is critical. For that reason, the Appear IQ mobility platform ensures the encryption of the data end to end. Secure data on devices Data at rest on the device is sandboxed within the Mobile App Container. All enterprise data and HTML5 applications are managed by the Mobile App Container and held securely in a database residing within it. The Mobile App Container makes sure that enterprise data is available to authorized applications only. The container ensures the isolation of enterprise data and restricts access of HTML5 applications to the subset on which they have the rights. The sandbox also ensures that data stored on the file systems is not directly accessible to unauthorized applications. In addition, the Mobile App Container can be configured to add an additional layer of 256-bit AES encryption of the database files. When enabled, cryptographic keys are stored in the operating system's secure KeyChain and KeyStore.
  • 7. SECURITYPOSITIONINGWHITEPAPER 6 The Mobile App Container makes use of the Address Space Layout Randomization (ASLR) functionality that protects against malicious access to data loaded in memory4 . Lastly, Mobile App Containers for Android and Windows Phone can be configured to use external storage. In this case, it can be configured to automatically encrypt data stored at this location. With that said, Appear recommend against storing sensitive data on these media. Secure data in motion Data in motion between the device and the mobility platform, or between the mobility platform and the backend (possibly represented by the Integration Adapter) are transferred over HTTPS. The Appear IQ Mobility Platform requires by default TLS v1.2 for encrypted communications with both mobile (128-bit key) and backend components (128-bit or 256-bit key). Besides, the Appear IQ Public and Private clouds can host dedicated JVM-based Integration Adapters (IA), on behalf of the businesses. Assuming the IA requires connectivity with businesses' enterprise systems, communications can be encrypted using TLS v1.2. Alternatively, a dedicated SSL tunnel can be established between the IA and the businesses' datacenter. Secure data in the platform The platform allows businesses to keep full control over what data will be stored in the Mobility Platform, and what data shall only securely transit through it. Data at rest in the Mobility Platform is stored in a central database, which has access restricted to the Mobility Platform at the network level. The central database is provided by our cloud hosting partner. Please refer to the section Cloud Compliance for a list of the certifications and attestations of our hosting partner. Both the default Appear IQ Public and Private clouds are hosted within the EU zone and fall under EU data privacy regulations. Alternative locations are possible for setting up Appear IQ Private clouds. In addition, when using the Appear IQ Private cloud, businesses can decide to enable SSL encryption between the Mobility Platform and the database. Lastly, the Appear IQ Mobility Platform is security hardened. Our security experts are continuously monitoring and addressing possible security risks found or publicly announced in underlying components. 4 ASLR is available on all supported iOS devices, Android devices running Android 4.0 and later.
  • 8. SECURITYPOSITIONINGWHITEPAPER 7 Cloud Compliance At time of writing, the Appear IQ Public and Private Clouds are deployed in Amazon AWS. The default Appear IQ Public and Private clouds are hosted in Ireland. Alternative locations are possible for setting up Appear IQ Private clouds. The Amazon AWS infrastructure has been designed and is managed in alignment with industry regulations, standards and best practices. Table 2 lists the third party attestations, reports and certifications that have been officially granted to the infrastructure. Please contact your Appear representative to access the official attestations. Certifications Notes HIPAA For entities and their business associates subject to the U.S. Health Insurance Portability and Accountability Act (HIPAA). SOC 1/SSAE 16/ISAE 3402 (formerly SAS70) The SOC 1 report audit attests that the control objectives are appropriately designed and that the controls safeguarding customer data are operating effectively. SOC 2 The SOC 2 is an evaluation of the design and operating effectiveness of controls that meet the criteria for the security principle set forth in the AICPA’s Trust Services Principles criteria. This report provides additional transparency into the security based on a defined industry standard and further demonstrates AWS’ commitment to protecting customer data. SOC 3 The SOC 3 report is a publically-available summary of the SOC 2 report and provides the AICPA SysTrust Security Seal. The report includes the external auditor’s opinion of the operation of controls (based on the AICPA’s Security Trust Principles included in the SOC 2 report). PCI DSS Level 1 The attestation confirms that the infrastructure has been successfully validated against standards applicable to a Level 1 service provider under PCI DSS Version 2.0. ISO 27001 ISO 27001 is a widely-adopted global security standard that outlines the requirements for information security management systems. It provides a systematic approach to managing company and customer information that’s based on periodic risk assessments. TABLE 2 - LIST OF CERTIFICATIONS AND ATTESTATIONS OF OUR PUBLIC AND PRIVATE CLOUDS
  • 9. SECURITYPOSITIONINGWHITEPAPER 8 Appear Networks Systems AB, Kista Science Tower, 164 51 Kista, Sweden Phone: +46(0)854591370 Web: www.appearnetworks.com contact info@appearnetworks.com