Publicité

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014

25 Sep 2014
Publicité

Contenu connexe

Publicité

Similaire à Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014(20)

Publicité

Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014

  1. Supporting any device How to retain control in a mobile world Dr Richard Hayton Chief Architect Mobile Platforms Group Citrix Systems Inc.
  2. Navigating the journey • What is your problem? • Understand your needs • Technical Approaches • MDM, MAM, Virtualization • Securing Mobility • 5 key areas • Future Considerations
  3. Data Apps Desktops Collaboration Personal Mobile users need access to business-grade apps and company data from any device. IT wants a secure, scalable, manageable solution that balances user access with privacy.
  4. Define the problem Freedom for users to access all apps and data Which apps matter from any of their devices today? What about tomorrow? Email? Cloud? Legacy? What data do they need? Is it sensitive? Do they need it offline? Is your focus on Phones, Tablets or Laptops? Will users expect all three? Are they company or personal devices? How much control can you have – and how much do you want?
  5. Technical Options Receiver WorxWeb WorxMail AnyProject Virtual App Access - Small corporate footprint - Highly secure / Online only Application Containers (MAM) - Focus on business apps - Enables personal device use Device Management (MDM) - Flexible control and configuration - Challenging for BYOD
  6. Virtual App Access
  7. Virtual App Access Ubiquitous and (with effort) very mobile friendly iPhone iPad Android Win8 Phone Win Laptop Linux PC Thin Client Web Browser Blackberry Mac Laptop Windows Desktops and Apps Mobile Enabled Built for Mobile
  8. Mobile Application Management (App Containers)
  9. Mobile Application Management (containers) • “Wraps” an application • Adds additional features • Typically via a SDK or ‘Wrapping’ tool • Examples: • MicroVPN – access to corporate internet • Encrypted Storage • Enterprise Authentication • Policy to control app execution • Communications with other apps Encrypted Storage Micro VPN Enterprise Auth Policy Inter-App Comms
  10. Cross container interaction • Managed apps usually work together • Share data • Share VPN • Share enterprise login • Interaction with external apps is usually restricted • Cut/paste • Open In • Use of camera / peripherals Encrypted Storage Micro VPN Enterprise Auth Policy Inter-App Comms Encrypted Storage Micro VPN Enterprise Auth Policy Inter-App Comms Encrypted Storage Micro VPN Enterprise Auth Policy Inter-App Comms
  11. Mobile Device Management MDM
  12. Mobile Device Management (MDM) What does it let you do…? • Ability to push applications & remove them later ᵒ Gives a smoother user experience ᵒ Reduces support costs • Ability to control device settings ᵒ Eg. configure wifi, require passcode ᵒ Maintains compliance. Reduces support. • Ability to monitor the device* ᵒ Determine which apps are installed ᵒ Look for jailbreaks / rootkits / policy breaches • Ability to wipe the device ᵒ Great if the device is lost / stolen ᵒ Dangerous in the wrong hands Great for corporate devices More questionable for BYOD ?
  13. Securing Mobile Devices And staying sane 5 Top Tips
  14. Manage only what matters …or you’ll die trying 1
  15. Think “user experience first” … or users will work around the system 2
  16. Virtualize and Containerize …to keep data in the datacenter and securely mobilize 3
  17. Automate desired outcomes …default mobile behaviors should be the ones most needed 4
  18. 19 Provisioning A Device For IT Link authorized users to Active Directory Automatically assigns new user to ‘role’ (e.g. sales) Auto-configure device— Email, Wifi, PIN, apps Ensure compliance
  19. 20 Provisioning A Device For the end user Enrolls device / signs up Key apps are pushed & device is configured Given unified app store with easy self-service Enterprise cloud storage immediately available
  20. 21 User Status Change Account disabled App accounts & data access instantly wiped Device wiped / settings reset
  21. Protect sensitive data above all else … it’s too late once it escapes 5
  22. Data policy – an example Data Location Device Type All grades of devices BYO Devices Corporate Devices Physically Secured Restricted On Premise Virtualized Access Virtualized Access Offline Mobile Access Confidential On Premise Virtualized Access Online Mobile Access Offline Mobile Access Low Value Secure Cloud Offline Mobile Access Offline Mobile Access Offline Mobile Access Note: Governments have their own data classification schemes that greatly expand on this simple model
  23. Per-App Policy Controls User authorization required Allow local storage Offline access allowed Restrict document sharing Enable internet access Validate device characteristics Configure timeouts
  24. Future Considerations
  25. EMM Enterprise Mobility Management Productivity and Collaboration Content Management App Management Device Management EMM is much more than MDM
  26. Typical customer roadmap… Step 1: Secure Apps and Data on Step 3: Mobilize Your Business • Mobilize business processes • Task-specific, contextually relevant • Buy, build, integrate & secure • Virtualized, web, or native • Rapid time-to-market all Devices Step 2: Workflow-driven Mobile Productivity • Mail • Browser • Docs • Office • Collaboration • Tasks, Notes, Chat…
  27. Typical customer roadmap… Step 1: Secure Apps and Data on Step 3: Mobilize Your Business • Mobilize business processes • Task-specific, contextually relevant • Easy to buy, build, integrate & secure • Virtualized, web, or native • Rapid time-to-market all Devices Step 2: Workflow-driven Mobile Productivity • Mail • Browser • Docs • Office • Collaboration • Tasks, Notes, Chat…
  28. Work better. Live better. www.citrix.com/byod www.citrix.com/xenmobile

Notes de l'éditeur

  1. For today’s agenda, we’ll start with a brief discussion of notable directions in mobility…
  2. Citrix is pioneering the idea of a mobile workspace. In many ways this representation of the mobile workspace mimics the EMM technical stack. Devices, applications, and data. A mobile workspace unites apps data and services so that they can be seamlessly and securely delivered to any user, on any device over any network or cloud. It’s all the apps you need secure access to – windows, web, SaaS, mobile – unified and simply and intuitively accessible from your app store It’s the data – files, information – that you can easily store, share and sync from anywhere It’s the ability to collaborate with people and work in share workspaces on common projects It’s any device you choose for whatever task you are performing – mobile, tablet, laptop, PC or Mac It’s wherever you are – untethered from the desk Its’ your workspace wherever you take it
  3. After all of Joe’s success he’s decided to take an early retirement. Good thing for him is that he can focus on packing his bags and not worry about making his device personal again. The moment Joe finishes his exit interview his account is disabled <click> and all company related information is wiped from the device.
  4. Federated Identity and Single Sign-on: Ever feel like all you do is login so that you can login and then someone asks you to login again? It’s frustrating for users. And for IT it feels like deja-vu when you’re setting up the same user/group permission structure everywhere. Wouldn’t it be great to provision apps based on user identity and leverage the structures you’ve already setup? With The Mobile Solutions Bundle you can do this and users are burdened with logging in at every turn. Key concepts: SSO for Windows, web, data center & mobile apps Provision apps based on user identity Workflow-based approvals for app access Scenario-based Access Control: If all networks were perfect and if every user kept used the latest and most secure devices or operating systems then IT would have an easier job, right? But that’s just not the reality and until it is, IT needs the ability to keep users from inadvertently putting the company at risk. Block network access based on device configuration. Create criteria that must be met for network access. Key concepts: Control network access to any application Scenario-based, secure remote access End point analysis and policy enforcement
  5. The EMM technical stack consists of 4 different layers. Mobile Device Management (MDM) Mobile Application Management (MAM) Mobile Content Management (MCM) or Data Management – Think file sharing Productivity and Collaboration – Mobile Apps working together to promote productivity. The EMM Technical stack is generally recognized by the industry and analysts. This is not something Citrix made up. In addition to these layers there is the critical security layer that needs to be present throughout the stack. Each layer is important. Missing layers or weak support for any of the EMM layers will result in a poor user experience.
  6. Thank you.
Publicité