Technology Council Discussion Ojas Rege, VP Strategy ojas@mobileiron.com July 16, 2014 @orege (twitter)
Past 1995+ 2010+ 1960+ 1980+ technology transitions Change the way people work Disrupt enterprise architectures Mainframe PC Internet Mobile First Era Era Era Era Create opportunities for innovation 2 MobileIron Confidential
In a Mobile First organization , users have access to every business process they need, on any device and app they want, with a secure experience they love. 3 MobileIron Confidential
The Journey to Mobile First Business Transformation New user & business experiences 1 st gen of mobile apps App & Content Mobile documents Enablement Cloud protections BYOD (user choice and privacy) Device Security Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement) 4 MobileIron Confidential
6
Company Vision Mobility unlocks human potential in the workplace
Security and management platform for mobile apps, content, and devices MobileIron architecture hypotheses (2008): • Multi-OS will be the standard • Data will be more important than voice • Users will choose their own technologies 8 MobileIron Confidential
MobileIron: Purpose-built architecture End user IT Core Apps@Work Management Console Docs@Work Reporting & Analytics tools AppConnect Insight Web@Work Ecosystem Mobile Admin App Help@Work Sentry Intelligent Gateway Tunnel Enterprise Resources Dataview 9 MobileIron Confidential
Ecosystem of choice Mobile awareness Mobile identity Mobile data Auto configuration One-click authentication Data separation 10 MobileIron Confidential
Magic Quadrant for Enterprise Mobility Management Suites 2014 Reprint available from MobileIron Gartner ¡“Magic ¡Quadrant ¡for ¡Enterprise ¡Mobility ¡Management ¡ Suites” ¡by ¡Terrence ¡Cosgrove, ¡Rob ¡Smith, ¡Chris ¡Silva, ¡Bryan ¡ Taylor, John Girard, Monica Basso, 3 June 2014 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from MobileIron. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 11 MobileIron Confidential
History of innovation: MobileIron patents BYOD Selective management of mobile device data US8695058 Privacy policy and monitoring of business data on personal devices Granted Apr 8, 2014 Certificates Management of certificates for mobile devices US8494485 Proxy-based access, transmission, and installation of mobile certificates Granted Jul 23, 2013 App store Management of mobile applications US8359016 Distribution of mobile applications through an enterprise app store Granted Jan 22, 2013 US8731529 Granted May 20, 2014 Mobile activity intelligence US8340633 Usage Collecting and analyzing mobile usage data Granted Dec 25, 2012 Architecture Virtual instance architecture for mobile US8060074 device management systems Granted Nov 15, 2011 US8396465 Underlying systems architecture Granted Mar 12, 2013 US8626147 Granted Jan 7, 2014 12 MobileIron Confidential
MobileIron Global User Conference June 17-20, 2014 San Francisco Attendee profile 68% have a BYOD program 71% use identity certificates 73% have an enterprise app store 70% have deployed Android 37% use API for integration 55% will EOL BlackBerry by end of year 13 MobileIron Confidential
Ground rules Fundamental shifts are changing Trust-based security • Patch-based (Win32) to trust-based (iOS, Android, Win8) • Identity and posture drive enterprise access and policy • Security moves from device to app to data The new economics of productivity • High-stakes battle for data ownership • iCloud vs. Google Drive vs. OneDrive vs. Dropbox • Storage and productivity tools are the carrots App Darwinism and the consumer cliff • Constant evolution of apps drives innovation and adoption • Consumer preference quickly shifts enterprise demand • Migration becomes an enterprise norm 14 MobileIron Confidential
Evolution of multi-OS 15 MobileIron Confidential
Evolution of operating system architecture Win32 iOS / Android / WP 8 Foundation Logon Win32 API UIKit Framework Framework Session Mgr NTDLL.DLL Graphics Audio Video User Mode User Mode Kernel Mode Kernel Mode Graphics Drivers System Utilities Win32K.sys HAL Printer Drivers Kernel MDM Primitives No user changes to kernel space � stability, ease of update / patching Built-in management primitives � simplicity, consistency Application sandboxing � security, ¡no ¡app ¡conflicts ¡(“DLL ¡hell”) 16 MobileIron Confidential
Evolution of mobile security Multiple, layered controls Each control is important and overlaps with all other controls. This ensures that the compromise of one control will be supplemented by the others. Controls are continuously evolving and getting better over time. 17 MobileIron Confidential
NATIVE USER EXPERIENCE authentication controls Policy enforcement Identity Device controls Network and Posture and trust Secure tunneling OS integrity Access control Secure app-to-app Closed-loop compliance communication Data containerization and Privacy controls DLP controls TRUSTED APP ECOSYSTEM 18 MobileIron Confidential
The evolution of app security Distribute Containerize Tunnel Deliver apps securely Protect data-at-rest Protect data-in-motion SDK Wrapping SDK Wrapping Enterprise app store Authentication DLP controls App-to-enterprise Scalable delivery Authorization Analytics App reputation Configuration Deletion App control Encryption 19 MobileIron Confidential
The evolution of IT Most important factors for mobile success (7 = most important to 1 = least important) What factors would most Agility and preparedness for change 6.58 contribute to your Ample resources 6.01 organization’s ¡ability ¡to ¡ Enabling technologies 5.60 maintain an effective Knowledgeable or expert staff 5.13 mobile strategy over time? Collaboration among business units 4.24 Effective leadership 3.97 A strong mobile security posture 2.61 Source: Ponemon Institute, March 2014 20 MobileIron Confidential
on www.glassdoor.com 21 MobileIron Confidential
Recommend
More recommend