SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Securing Your Mobile Backend
Dimitri Sirota
CSO,
Layer 7 Technologies
Christian Kane
Enterprise Mobility, Infrastructure & Operations Analyst,
Forrester Research, Inc.
June 20, 2013
Layer 7 Confidential 2Layer 7 Confidential 2
Questions
-Chat any questions you have and we’ll answer them at the
end of this webinar
Twitter
- Today’s event hashtag: #L7webinar
Follow us on Twitter:
@layer7
@forrester
Layer 7 Confidential
Webinar Housekeeping
Layer 7 Confidential 3Layer 7 Confidential 3
© 2009 Forrester Research, Inc. Reproduction Prohibited
Mobile Enablement:
Evolve Your Strategy Beyond MDM
Christian Kane, Analyst
Forrester Research
June 20, 2013
Layer 7 Confidential 4Layer 7 Confidential 4© 2012 Forrester Research, Inc. Reproduction Prohibited
The line between personal and work computing is
breaking down
Layer 7 Confidential 5Layer 7 Confidential 5
© 2012 Forrester Research, Inc. Reproduction Prohibited
IT is Consumerizing: We’re all highly influenced by the
technology we use at home
Base: 3,258 North American and European technology end users
Source: Forrsights Workforce Employee Survey, Q4 2012
6%
15%
39%
40%
Older Boomers and Seniors (57+)
Younger Boomers (47-56)
Gen X (33-46)
Gen Y (18-32)
“Please indicate how much each statement describes your attitudes toward technology and
your lifestyle?”
The technology I have at home is better than the technology I have at work
Layer 7 Confidential 6Layer 7 Confidential 6
Sample Size = 190 enterprise IT decision makers who are planning, piloting, or have implemented a BYOD program]
Source: Forrsights Hardware Survey, Q3 2012
Why does your firm support, or is your IT organization planning to support, bring-your-own device
program?
3%
16%
18%
37%
41%
42%
51%
65%
Other reason
HR believes it will help attract new hires to our
company
Executive direction or requirement
Lower support costs
Improved self-service for end users
It will help us support a mobile workforce
Lower purchase costs for the company
End users prefer it
This is Driving Demand for mobile BYOD
programs
Layer 7 Confidential 7Layer 7 Confidential 7
© 2012 Forrester Research, Inc. Reproduction Prohibited
IT faces conflicting mobility needs from
business decision-makers and employees
Task WorkersIT ExecutivesBusiness Decision Makers
•Productive devices
•Efficient employees
•LOB applications
•Cost effective solutions
•Consistent usage
•Standard, corporate
approved devices and
applications
•Scalable solutions
•Minimize costs
• Ensure security
•Multi-user
•Designed for specific
task
•Corporate owned
•Advanced support
Layer 7 Confidential 8Layer 7 Confidential 8
Source: Forrester’s Forrsights networks and telecommunications survey, Q1 2012
Base: 1,535 mobile technologies and services decision-makers at North American and European companies
(multiple responses accepted)
Security in BYOD is top mobile challenges
Layer 7 Confidential 10Layer 7 Confidential 10
8%
8%
10%
15%
15%
19%
27%
30%
33%
37%
37%
A self-service portal where employees can configure and
manage their devices
Mobile service telecom expense software
Access to detailed reporting and usage analytics
Deploy and update custom-developed apps
Deploy and manage third-party productivity apps that the
company has vetted/bought for employees
Provision data access and apps based on employee
role/function
We do not support any apps besides those that are
already on the phone
Help desk support for mobile apps
Break/fix/replace hardware service
Manage security on the device
Device configuration management
Today, which of the following capabilities does your firm provide to support
smartphones and tablets?
Source: Forrester’s Forrsights networks and telecommunications survey, Q1 2012
Base: 1,535 mobile technologies and services decision-makers at North American and European companies
(multiple responses accepted)
Most firms currently address security by
implementing basic mobile device and
application management features
Layer 7 Confidential 11Layer 7 Confidential 11
Most firms start with MDM…
January 2012 “Market Overview: On-Premise Mobile Device Management Solutions”
Layer 7 Confidential 12Layer 7 Confidential 12
…But realize they’re dealing with this
Cloud Devices Apps
Layer 7 Confidential 13Layer 7 Confidential 13
What are your firm's plans to adopt the following mobile technologies?
17%
22%
28%
23%
53%
35%
33%
18%
Smartphones for employees
Tablets for employees
Mobile applications
Enterprise app store solutions to
deploy and manage smartphone and
tablet applications
Planning to implement
Implemented or expanding
Source: Forrsights Budgets And Priorities Tracker Survey Q4 2012
Base = 3,753 global IT executives and technology budget decision-makers
Multiple devices means applications become much more
important
Layer 7 Confidential 14Layer 7 Confidential 14
MDM evolves with MAM, data management, security,
and support options
- Device support
- Windows Mobile/CE
- Windows / Mac
- App support
- Remote control
- Dual persona
- Expense management
• Application management
› Security
› SDKs/Containers
• Data containers
• Secure file sync & share
Management & Support Apps & Data
Layer 7 Confidential 15Layer 7 Confidential 15
Source: Forrsights Software Survey, Q4 2012
As your firm considers its mobile strategy and investments, which departments or
business groups is it most focused on?
2%
5%
8%
9%
12%
18%
19%
20%
34%
34%
42%
48%
Don't know
Other
Manufacturing (e.g., production planning/execution)
Procurement (e.g., sourcing, supplier selection)
Order fulfillment (e.g., distribution, transportation)
Office of the CEO and other executive management
Corporate services (e.g., finance, human resources)
Research and development (e.g., product portfolio planning…
Marketing (e.g., promotions, campaigns)
Customer service (e.g., returns, complaint management)
Field service (operations and maintenance)
Sales (e.g., customer segmentation, order management)
Base = 704 global software decision-makers
Investing in Customer facing apps that require backend
access
Layer 7 Confidential 16Layer 7 Confidential 16
Base = 1,749 North American and European information workers who use a smartphone for work
Source: Forrsights Workforce Employee Survey, Q2 2012
“What smartphone/tablet applications do you currently use for work?"
15%
18%
19%
20%
21%
25%
25%
28%
32%
36%
39%
40%
58%
73%
85%
Wikis for internal information sharing
Microblogging (e.g. Twitter)
Web meeting or webconferencing
Team document sharing sites (e.g., SharePoint)
Data dashboard or business intelligence application
Expense tracking and/or approval
Travel planning and status
Employee intranet or company portal
Specific line of business applications (e.g. sales)
Social networks (e.g. LinkedIn, Facebook)
Note taking application
Instant messaging/chat (not SMS/texting)
SMS (texting)
Calendar
Email
Investing in business and collaboration apps that
need backend access
Layer 7 Confidential 18Layer 7 Confidential 18
Backend data and application access means
enterprises need a strategy beyond basic MDM /
MAM support
18
• BYOD strategy
• Mobile device and security management
options
• File sync/share
• Securing, provisioning, and managing mobile
apps
• Protecting data
• Ensuring secure mobile application
development
Layer 7 Confidential 19Layer 7 Confidential 19
The Path To Enablement Requires Backend Data &
Application Access
MDM
• Devices:
Smartphones
• Access: Email,
contacts, calendar
Device
Independence
• Devices: Tablets
• Access: Some
business apps,
file sync & share,
corporate
systems.
Backend Data
Access
• Devices: Mobile
+ PC
• Access: Any
app, any data.
Layer 7 Confidential 20Layer 7 Confidential 20
© 2009 Forrester Research, Inc. Reproduction Prohibited
Thank you!
Christian Kane
+1 617.613.6467
ckane@forrester.com
@ChristianKane
www.forrester.com
Layer 7 Confidential 21Layer 7 Confidential 21
Mobile Apps Need Enterprise Data
Layer 7 Confidential 22Layer 7 Confidential 22
Can Your Backend Applications Trust Your Apps
DMZ
DATA
Layer 7 Confidential 23Layer 7 Confidential 23
MDM / MAM Protect the App But Who Protects Your Applications?
DMZ
DATA
Layer 7 Confidential 24Layer 7 Confidential 24
Security Needs to Span Device to Datacenter
Layer 7 Confidential 25Layer 7 Confidential 25
Creates Need for Mobile Gatekeeper to Backend Data &
Applications
Layer 7 Confidential 26Layer 7 Confidential 26
Mobile Access API Gateway Provides Apps Secure Data
Access & Bridge to Enterprise Services
Render backend applications and data-sources (SQL) as RESTful APIs.
Translate XML to JSON & SOAP to REST. Compose new API from multiple
backend services.
API Adaptation
Protect enterprise application and data against attack or misuse. Secure
REST and SOAP APIs. Validate XML and JSON Data. Secure streamed
Sockets data.
Mobile Application
Firewalling
Translate token types. Map SAML and Web SSO to OAuth. Implement
OpenID Connect. Broker SSO with Cloud Services. Integrate with outside
Geo-location Services for richer access policies. Enable X-device sessions.
Identity Mapping & SSO
Improve mobile performance through compression, integration with CDN,
XML to JSON conversion, pre-fetch on hypermedia APIs, Backend
response aggregation, caching on request and response.
Optimization
Broker interactions with external SaaS providers like Salesforce. Mediate
social interactions. Push notification services. Connectivity with carrier
network APIs.
Cloud Orchestration
Layer 7 Confidential 27Layer 7 Confidential 27
Layer 7 Mobile Access Gateway Addresses Critical
Mobile Security, Management & Adaptation Needs
Identity
Security
Adaptation
Optimization
Cloud
Orchestration
Layer 7 Confidential 28Layer 7 Confidential 28
 Map Web SSO & SAML to mobile-friendly OAuth,
OpenID Connect and JSON Web Tokens
 Create granular access policies at user, app and
device levels
 Build composite access policies combining
geolocation, message content and other network
attributes
 Simplify PKI-based certificate delivery and
provisioning
Identity: Extending Enterprise Identity to Mobile
+
Layer 7 Confidential 29Layer 7 Confidential 29
 Protect REST and SOAP APIs against DoS and
API attacks
 Proxy API streaming protocols like HTML5
Websocket and XMPP messaging
 Enforce FIPS 140-2 grade data privacy and
integrity
 Validate data exchanges, including all JSON,
XML, header and parameter content
Security: Mobile Application Firewalling
Layer 7 Confidential 30Layer 7 Confidential 30
 Surface any legacy application or database as
RESTful APIs
 Quickly map between data formats such as
XML and JSON
 Recompose & virtualize APIs to specific
mobile identities, apps and devices
 Orchestrate API mashups with configurable
workflow
Adaptation: Translate & Orchestrate Data & APIs
Layer 7 Confidential 31Layer 7 Confidential 31
 Cache calls to backend applications
 Recompose small backend calls into efficiently
aggregated mobile requests
 Compress traffic to minimize bandwidth costs and
improve user experience
 Pre-fetch content for hypermedia-based API calls
Optimization: Handle Scale
Layer 7 Confidential 32Layer 7 Confidential 32
 Proxy and manage app interactions
with social networks
 Broker call-outs to cloud services
like Salesforce.com
 Bridge connectivity to iPhone and
Android notification services
 Integrate with legacy applications
using ESB capabilities
Integration: Centralize Cloud Connectivity
Layer 7 Confidential 33Layer 7 Confidential 33
Questions?
Dimitri Sirota
CSO,
Layer 7 Technologies
dsirota@layer7.com
Christian Kane
Enterprise Mobility, Infrastructure & Operations Analyst,
Forrester Research, Inc.
ckane@forrester.com
Layer 7 Confidential 34Layer 7 Confidential 34
Upcoming Events
Layer 7 Tech Talk
June 26th – 9am PDT
APIs: Fueling Mobile, Social, IoT & Big Data
http://layer7.com/live

Contenu connexe

Tendances

EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentAnyPresence
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014Symantec
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureCisco Services
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...AMD Developer Central
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 

Tendances (20)

EMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App DevelopmentEMM and MBaaS: How IT Can Enable Secure App Development
EMM and MBaaS: How IT Can Enable Secure App Development
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s Future
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
SE-4063, Leveraging Fingerprint Biometric Authentication to Streamline Secure...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 

Similaire à Securing Your Mobile Backend featuring Forrester Research inc - Combine API Backend Security with MDM/MAM to Implement End-to-End Mobile Security

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell World
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxArrow ECS UK
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyDenodo
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivoSoftware
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 

Similaire à Securing Your Mobile Backend featuring Forrester Research inc - Combine API Backend Security with MDM/MAM to Implement End-to-End Mobile Security (20)

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
Verivo and Forrester Mobile Strategies
Verivo and Forrester Mobile StrategiesVerivo and Forrester Mobile Strategies
Verivo and Forrester Mobile Strategies
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 

Plus de CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 

Plus de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Securing Your Mobile Backend featuring Forrester Research inc - Combine API Backend Security with MDM/MAM to Implement End-to-End Mobile Security

  • 1. Securing Your Mobile Backend Dimitri Sirota CSO, Layer 7 Technologies Christian Kane Enterprise Mobility, Infrastructure & Operations Analyst, Forrester Research, Inc. June 20, 2013
  • 2. Layer 7 Confidential 2Layer 7 Confidential 2 Questions -Chat any questions you have and we’ll answer them at the end of this webinar Twitter - Today’s event hashtag: #L7webinar Follow us on Twitter: @layer7 @forrester Layer 7 Confidential Webinar Housekeeping
  • 3. Layer 7 Confidential 3Layer 7 Confidential 3 © 2009 Forrester Research, Inc. Reproduction Prohibited Mobile Enablement: Evolve Your Strategy Beyond MDM Christian Kane, Analyst Forrester Research June 20, 2013
  • 4. Layer 7 Confidential 4Layer 7 Confidential 4© 2012 Forrester Research, Inc. Reproduction Prohibited The line between personal and work computing is breaking down
  • 5. Layer 7 Confidential 5Layer 7 Confidential 5 © 2012 Forrester Research, Inc. Reproduction Prohibited IT is Consumerizing: We’re all highly influenced by the technology we use at home Base: 3,258 North American and European technology end users Source: Forrsights Workforce Employee Survey, Q4 2012 6% 15% 39% 40% Older Boomers and Seniors (57+) Younger Boomers (47-56) Gen X (33-46) Gen Y (18-32) “Please indicate how much each statement describes your attitudes toward technology and your lifestyle?” The technology I have at home is better than the technology I have at work
  • 6. Layer 7 Confidential 6Layer 7 Confidential 6 Sample Size = 190 enterprise IT decision makers who are planning, piloting, or have implemented a BYOD program] Source: Forrsights Hardware Survey, Q3 2012 Why does your firm support, or is your IT organization planning to support, bring-your-own device program? 3% 16% 18% 37% 41% 42% 51% 65% Other reason HR believes it will help attract new hires to our company Executive direction or requirement Lower support costs Improved self-service for end users It will help us support a mobile workforce Lower purchase costs for the company End users prefer it This is Driving Demand for mobile BYOD programs
  • 7. Layer 7 Confidential 7Layer 7 Confidential 7 © 2012 Forrester Research, Inc. Reproduction Prohibited IT faces conflicting mobility needs from business decision-makers and employees Task WorkersIT ExecutivesBusiness Decision Makers •Productive devices •Efficient employees •LOB applications •Cost effective solutions •Consistent usage •Standard, corporate approved devices and applications •Scalable solutions •Minimize costs • Ensure security •Multi-user •Designed for specific task •Corporate owned •Advanced support
  • 8. Layer 7 Confidential 8Layer 7 Confidential 8 Source: Forrester’s Forrsights networks and telecommunications survey, Q1 2012 Base: 1,535 mobile technologies and services decision-makers at North American and European companies (multiple responses accepted) Security in BYOD is top mobile challenges
  • 9. Layer 7 Confidential 10Layer 7 Confidential 10 8% 8% 10% 15% 15% 19% 27% 30% 33% 37% 37% A self-service portal where employees can configure and manage their devices Mobile service telecom expense software Access to detailed reporting and usage analytics Deploy and update custom-developed apps Deploy and manage third-party productivity apps that the company has vetted/bought for employees Provision data access and apps based on employee role/function We do not support any apps besides those that are already on the phone Help desk support for mobile apps Break/fix/replace hardware service Manage security on the device Device configuration management Today, which of the following capabilities does your firm provide to support smartphones and tablets? Source: Forrester’s Forrsights networks and telecommunications survey, Q1 2012 Base: 1,535 mobile technologies and services decision-makers at North American and European companies (multiple responses accepted) Most firms currently address security by implementing basic mobile device and application management features
  • 10. Layer 7 Confidential 11Layer 7 Confidential 11 Most firms start with MDM… January 2012 “Market Overview: On-Premise Mobile Device Management Solutions”
  • 11. Layer 7 Confidential 12Layer 7 Confidential 12 …But realize they’re dealing with this Cloud Devices Apps
  • 12. Layer 7 Confidential 13Layer 7 Confidential 13 What are your firm's plans to adopt the following mobile technologies? 17% 22% 28% 23% 53% 35% 33% 18% Smartphones for employees Tablets for employees Mobile applications Enterprise app store solutions to deploy and manage smartphone and tablet applications Planning to implement Implemented or expanding Source: Forrsights Budgets And Priorities Tracker Survey Q4 2012 Base = 3,753 global IT executives and technology budget decision-makers Multiple devices means applications become much more important
  • 13. Layer 7 Confidential 14Layer 7 Confidential 14 MDM evolves with MAM, data management, security, and support options - Device support - Windows Mobile/CE - Windows / Mac - App support - Remote control - Dual persona - Expense management • Application management › Security › SDKs/Containers • Data containers • Secure file sync & share Management & Support Apps & Data
  • 14. Layer 7 Confidential 15Layer 7 Confidential 15 Source: Forrsights Software Survey, Q4 2012 As your firm considers its mobile strategy and investments, which departments or business groups is it most focused on? 2% 5% 8% 9% 12% 18% 19% 20% 34% 34% 42% 48% Don't know Other Manufacturing (e.g., production planning/execution) Procurement (e.g., sourcing, supplier selection) Order fulfillment (e.g., distribution, transportation) Office of the CEO and other executive management Corporate services (e.g., finance, human resources) Research and development (e.g., product portfolio planning… Marketing (e.g., promotions, campaigns) Customer service (e.g., returns, complaint management) Field service (operations and maintenance) Sales (e.g., customer segmentation, order management) Base = 704 global software decision-makers Investing in Customer facing apps that require backend access
  • 15. Layer 7 Confidential 16Layer 7 Confidential 16 Base = 1,749 North American and European information workers who use a smartphone for work Source: Forrsights Workforce Employee Survey, Q2 2012 “What smartphone/tablet applications do you currently use for work?" 15% 18% 19% 20% 21% 25% 25% 28% 32% 36% 39% 40% 58% 73% 85% Wikis for internal information sharing Microblogging (e.g. Twitter) Web meeting or webconferencing Team document sharing sites (e.g., SharePoint) Data dashboard or business intelligence application Expense tracking and/or approval Travel planning and status Employee intranet or company portal Specific line of business applications (e.g. sales) Social networks (e.g. LinkedIn, Facebook) Note taking application Instant messaging/chat (not SMS/texting) SMS (texting) Calendar Email Investing in business and collaboration apps that need backend access
  • 16. Layer 7 Confidential 18Layer 7 Confidential 18 Backend data and application access means enterprises need a strategy beyond basic MDM / MAM support 18 • BYOD strategy • Mobile device and security management options • File sync/share • Securing, provisioning, and managing mobile apps • Protecting data • Ensuring secure mobile application development
  • 17. Layer 7 Confidential 19Layer 7 Confidential 19 The Path To Enablement Requires Backend Data & Application Access MDM • Devices: Smartphones • Access: Email, contacts, calendar Device Independence • Devices: Tablets • Access: Some business apps, file sync & share, corporate systems. Backend Data Access • Devices: Mobile + PC • Access: Any app, any data.
  • 18. Layer 7 Confidential 20Layer 7 Confidential 20 © 2009 Forrester Research, Inc. Reproduction Prohibited Thank you! Christian Kane +1 617.613.6467 ckane@forrester.com @ChristianKane www.forrester.com
  • 19. Layer 7 Confidential 21Layer 7 Confidential 21 Mobile Apps Need Enterprise Data
  • 20. Layer 7 Confidential 22Layer 7 Confidential 22 Can Your Backend Applications Trust Your Apps DMZ DATA
  • 21. Layer 7 Confidential 23Layer 7 Confidential 23 MDM / MAM Protect the App But Who Protects Your Applications? DMZ DATA
  • 22. Layer 7 Confidential 24Layer 7 Confidential 24 Security Needs to Span Device to Datacenter
  • 23. Layer 7 Confidential 25Layer 7 Confidential 25 Creates Need for Mobile Gatekeeper to Backend Data & Applications
  • 24. Layer 7 Confidential 26Layer 7 Confidential 26 Mobile Access API Gateway Provides Apps Secure Data Access & Bridge to Enterprise Services Render backend applications and data-sources (SQL) as RESTful APIs. Translate XML to JSON & SOAP to REST. Compose new API from multiple backend services. API Adaptation Protect enterprise application and data against attack or misuse. Secure REST and SOAP APIs. Validate XML and JSON Data. Secure streamed Sockets data. Mobile Application Firewalling Translate token types. Map SAML and Web SSO to OAuth. Implement OpenID Connect. Broker SSO with Cloud Services. Integrate with outside Geo-location Services for richer access policies. Enable X-device sessions. Identity Mapping & SSO Improve mobile performance through compression, integration with CDN, XML to JSON conversion, pre-fetch on hypermedia APIs, Backend response aggregation, caching on request and response. Optimization Broker interactions with external SaaS providers like Salesforce. Mediate social interactions. Push notification services. Connectivity with carrier network APIs. Cloud Orchestration
  • 25. Layer 7 Confidential 27Layer 7 Confidential 27 Layer 7 Mobile Access Gateway Addresses Critical Mobile Security, Management & Adaptation Needs Identity Security Adaptation Optimization Cloud Orchestration
  • 26. Layer 7 Confidential 28Layer 7 Confidential 28  Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens  Create granular access policies at user, app and device levels  Build composite access policies combining geolocation, message content and other network attributes  Simplify PKI-based certificate delivery and provisioning Identity: Extending Enterprise Identity to Mobile +
  • 27. Layer 7 Confidential 29Layer 7 Confidential 29  Protect REST and SOAP APIs against DoS and API attacks  Proxy API streaming protocols like HTML5 Websocket and XMPP messaging  Enforce FIPS 140-2 grade data privacy and integrity  Validate data exchanges, including all JSON, XML, header and parameter content Security: Mobile Application Firewalling
  • 28. Layer 7 Confidential 30Layer 7 Confidential 30  Surface any legacy application or database as RESTful APIs  Quickly map between data formats such as XML and JSON  Recompose & virtualize APIs to specific mobile identities, apps and devices  Orchestrate API mashups with configurable workflow Adaptation: Translate & Orchestrate Data & APIs
  • 29. Layer 7 Confidential 31Layer 7 Confidential 31  Cache calls to backend applications  Recompose small backend calls into efficiently aggregated mobile requests  Compress traffic to minimize bandwidth costs and improve user experience  Pre-fetch content for hypermedia-based API calls Optimization: Handle Scale
  • 30. Layer 7 Confidential 32Layer 7 Confidential 32  Proxy and manage app interactions with social networks  Broker call-outs to cloud services like Salesforce.com  Bridge connectivity to iPhone and Android notification services  Integrate with legacy applications using ESB capabilities Integration: Centralize Cloud Connectivity
  • 31. Layer 7 Confidential 33Layer 7 Confidential 33 Questions? Dimitri Sirota CSO, Layer 7 Technologies dsirota@layer7.com Christian Kane Enterprise Mobility, Infrastructure & Operations Analyst, Forrester Research, Inc. ckane@forrester.com
  • 32. Layer 7 Confidential 34Layer 7 Confidential 34 Upcoming Events Layer 7 Tech Talk June 26th – 9am PDT APIs: Fueling Mobile, Social, IoT & Big Data http://layer7.com/live