Upload
andris-soroka
View
733
Download
3
Embed Size (px)
DESCRIPTION
Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.
Citation preview
The Platform for Mobile IT Daan Hakaart
EMEA Sales Director
Mobile drives a fundamental shift in behavior
2
Desktop as primary Mobile as primary
Salesforce
Task workers
Knowledge workers
Industry-specific roles
The birth of Mobile IT
3
IT Mobile
User-led Cross-functional Consumer speed
Security,
management,
and apps are
intertwined
Multi-OS
UX-driven
Innovation-centric
Consumerization
Short lifecycles
Micro apps
“The more the CIO says no, the less secure the organization becomes.”
Vivek Kundra, U.S. Federal CIO
Mobile IT transforms business
4
Financial Services
Healthcare, Pharma & Medical Devices
Professional Services
Retail & Consumer Goods
Government & Education
Travel and Hospitality
Technology & Manufacturing
Mobile IT requirements in the post-PC era
5
Mobilize apps and documents
Support mobile OS and device evolution
Deploy at scale across global organizations
Prevent data loss
Preserve user experience and privacy
Inte
llig
en
t G
ate
way
(Tu
nn
eli
ng
an
d A
cc
es
s C
on
tro
l)
2
En
terp
ris
e In
fra
str
uc
ture
6
is …
1 End-User Services
3 Mobile Policy & Configuration Engine
RULES &
REPORTING
CERTS &
DIRECTORY
APP
STOREFRONT
DEVICES CONTENT USER
SELF-SERVICE
7
Best at security
Best at apps
Architected for
scale
Most trusted
cloud
Purpose-built for
Mobile IT
Focused on
customer success
MobileIron advantage
3,000 customers in 24 months
97% customer support satisfaction
60+ customers in print
Industry recognition
Gartner:
Info-Tech:
IDC:
BusinessWeek:
8
Leaders Quadrant of 2012 MDM Magic Quadrant (May 2012)
Champion in 2012 MDM Vendor Landscape (Aug 2012)
Largest and fastest growing mobile enterprise management specialist (Sept 2012)
One of five hottest enterprise startups (Sept 2012)
(Reprint available from MobileIron)
Gartner, Inc: “Magic Quadrant for Mobile Device Management Software” by Philip Redman, John Girard,
and Monica Basso (May 17, 2012). This graphic was published by Gartner, Inc. as part of a larger research
document and should be evaluated in the context of the entire document. The Gartner document is available
upon request from https://info.mobileiron.com/gartner-magic-quadrant.html.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not
advise technology users to select only those vendors with the highest ratings. Gartner research publications
consist of the opinions of Gartner's research organization and should not be construed as statements of fact.
Gartner disclaims all warranties, expressed or implied, with respect to this research, including any
warranties of merchantability or fitness for a particular purpose
2012 Magic Quadrant for Mobile
Device Management Software
AirWatch
BoxTone
Fiberlink
Good McAfee
MobileIron
RIM
SOTI
SAP
Symantec
Zenprise
Sophos
Info-Tech Research Group, Inc., Vendor Landscape: Mobile Device Management Suites, August
2012. Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in
the technology marketplace. Assessing vendors by the strength of their offering and their
strategy for the enterprise, Info-Tech Research Group Vendor Landscapes pay tribute to the
contribution of exceptional vendors in a particular category.
2012 MDM Vendor Landscape
August 2012
MobileIron across the Mobile IT lifecycle
9
4 Roll out at scale
Group-based
User self-service
Multi-tier management
AD/LDAP
Certificates
BES
2 Integrate tightly
Email and apps
Policy and identity
Connectivity (Wi-Fi, VPN)
By group, individual, or ownership
1 Configure securely
3 Protect privacy
BYOD programs
Regional regulations
Across OS
For apps and devices
For BYOD and corporate programs
5 Manage inventory
Wipe corporate data 15 Limit roaming costs 14
Deliver apps at scale
Protect app container 12
11
Tunnel app data 13 Apps
6 Monitor risk
8 Enforce identity
9 Automate workflow
7 Control access
Security
Access and protect docs 10
Docs
MobileIron architecture: Deployment
10
Inte
rne
t D
MZ
C
orp
ora
te N
etw
ork
Note: MobileIron VSP, Sentry, and Atlas can be deployed
behind the corporate firewall if desired
Certificate
Authority LDAP
Security
Enterprise
Applications
Apps/Content
Administrators End Users
Users Email/PIM
VSP (Publishing, policy, config, identity, automation)
Atlas (Central console, reporting, multi-tier mgmt)
(Physical, virtual, or cloud)
Google MobileIron Apple
Datacenter
Multi-OS
Apps@Work
Docs@Work
Secure data
Trusted apps
(Enterprise app storefront)
(Secure document container)
(Privacy, identity, compliance)
(Secure app containers)
Delivery Network
App Delivery Network
(High volume delivery)
Sentry (Intelligent gateway)
(Physical or virtual)
Mobile IT challenge: Two unstoppable forces
11
Content Wave
App Storm
Create value
Protect data
Move fast
CIO mandate:
MobileIron across the apps lifecycle
12
Distribute
Private
Storefront
App
Delivery
Network
App
Control
Apps@Work
App
Tunnel
AppTunnel
Protect data-in-motion
Tunnel Containerize
App
SDK
App
Wrapping
AppConnect
Protect data-at-rest
Dynamic Policy
Authentication
Authorization
Configuration
Usage Tracking
Deletion
MobileIron architecture: Full app lifecycle
13
Components
Apps@Work
• Private app storefront
• Tied to device identity and posture
• Selective wipe of app data
• Industry-leading user experience
App Delivery Network (AppDN)
• Highly scalable app distribution
App Control
• Blacklist and whitelist
AppConnect
• Data protection: encryption, single sign-on
• DLP: secure app-to-app communications
• App-specific data wipe
• Security wrapper or SDK
AppTunnel
• Secure tunnel for app traffic through Sentry
App requirements:
• Secure app distribution
• Scalable downloads
• Data loss prevention for data-at-rest
• Data loss prevention for data-in-motion
• Protection from rogue apps
MobileIron architecture: Content management
14
Content security requirements:
• Data loss prevention for email attachments
• Secure distribution of SharePoint
• … without new repository or storage cost
Components
Intelligent gateway (Sentry)
• Protection of email attachments
Secure content hub (Docs@Work)
• Secure viewing of email attachments
• Secure access to SharePoint docs
• Secure on-device storage
• Cut/copy/paste restrictions
• No “Open in” access for rogue apps
• Doc selective wipe if out of compliance
Context-aware policy and identity
• Tight integration with existing group-based
security and remediation polices
Enterprise architecture
• Tight integration with existing content systems
• No new content repository required
• No new storage required
MobileIron architecture: Layered security
15
Multiple layers of security requirements:
• Email access and attachments
• Apps and docs
• BYOD data separation and privacy
• Rogue app access
• Compromised devices
• Lost devices
… without damaging user experience
Components
Intelligent gateway
• Email access and attachment control
• Secure tunnel for email, apps, docs
Secure containers for apps and docs
• Distribution, deletion, data protection
BYOD groups and controls
• Privacy policy and selective wipe
Compliance and automated remediation
• Posture detection: OS, apps, encryption
• Workflow: notification, access, quarantine, wipe
Identity
• AD/LDAP integration (group, OU, user)
• On-board or external certificate authority
• Secure multi-user with fast switching
Baseline security and configuration
• Lock, wipe, password, secure Wi-Fi/VPN
MobileIron architecture: Real-world scale
16
Large enterprise requirements: • Deploy 100,000+ devices • Deploy 100MB+ sized apps • Deploy 100,000+ certificates • Manage with low total cost of ownership
Components
Operational scale (on-premise and cloud)
• 100,000 devices per appliance
• 20,000 registrations per hour
• Biggest single certs site: 150,000 certs deployed
Apps scale (App Delivery Network)
• No limit on app size
• No impact on corporate network
• Fast download performance for user
Low total cost of ownership
• Easy installs and upgrades
• No DBA, Windows patching, server licenses
• 1 FTE can manage 10,000 to 20,000 devices
Scale testing
• TRUST – Test Reliability Under STress –
automation system – unique in industry
• MDM/MAM loads of 100,000+ devices
MobileIron investment in customer success
17
World-class global technical support and services
Domain expertise around mobility best practices
BYOD, Apps, Android,
Large Deployments
Prepare
Develop
Roll out
Sustain
Training and certification
Best practice toolkits
Evaluation companion
Peer community
What customers are saying …
18
As the Director of Information Technology, I have been working with technology solutions providers and their associated vendor support personnel for many years. Ms. B’s knowledge, professionalism, client relationship skills, and mentoring capabilities far surpassed the abilities of the technical representatives from other vendors. My staff and I were extremely impressed with Ms. B’s performance and believe that her capabilities and those of her team help distinguish the MobileIron solutions from the competition.
MobileIron University in general is just awesome— it's been an incredible resource for me
In this day and age of bad customer service, my experience with MobileIron has been consistently great and this last request for help was the best yet.
MobileIron provides great support and actually listens to customer feedback.
The MobileIron team is extremely responsive to customer needs. I have seen the platform growing from Beta all the way to become a leader in the Gartner Quadrant. That happens because MobileIron listens to its customers.
I learned more during the sessions than I did during the last 6 months running our mobility project
This is hands-down the most comprehensive set of BYOD
documentation I have seen from a single source to date.
Companies are building a new Mobile IT stack
19
App dev
Distribution (app store)
Data security
Apps
Authoring
Distribution (content hub)
Data security Collaboration
Content
Voice Data Wi-Fi VPN CDN
Network services
Credentials SSO Persona
Identity
Access
Security & mgmt
Global mgmt Security
MobileIron focus
20
Voice Data Wi-Fi VPN CDN
Access
App dev
Distribution (app store)
Data security
Authoring
Distribution (content hub)
Data security Collaboration
Credentials SSO Persona
Network services
Security & mgmt
Apps
Content
Identity
Global mgmt Security
Next set of Mobile IT challenges
21
Boundaries blur: Content vs. app, mobile vs. desktop
Shadow IT explodes for apps: Innovation or chaos?
Identity becomes strategic: Glue for mobile enterprise
“I am my own CIO”: Help-yourself-desk
OS turbulence is the norm: Must support 3+ OS