Technology Council Discussion
Ojas Rege, VP Strategy July 16, 2014
- jas@mobileiron.com
Technology Council Discussion Ojas Rege, VP Strategy - - PowerPoint PPT Presentation
Technology Council Discussion Ojas Rege, VP Strategy ojas@mobileiron.com July 16, 2014 @orege (twitter) Past 1995+ 2010+ 1960+ 1980+ technology transitions Change the way people work Disrupt enterprise architectures Mainframe PC
2 MobileIron Confidential
Mainframe Era
1960+
PC Era
1980+
Internet Era
1995+
Change the way people work Disrupt enterprise architectures Create opportunities for innovation Mobile First Era
3 MobileIron Confidential
4 MobileIron Confidential
BYOD (user choice and privacy) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement)
App & Content Enablement
1st gen of mobile apps Mobile documents Cloud protections
Business Transformation
New user & business experiences
6
8 MobileIron Confidential
Security and management platform for mobile apps, content, and devices
MobileIron architecture hypotheses (2008):
9 MobileIron Confidential
Enterprise Resources AppConnect Ecosystem Apps@Work Docs@Work Web@Work Help@Work Tunnel Dataview Insight
Mobile Admin App
Sentry
Intelligent Gateway
Core
Management Console Reporting & Analytics tools
10 MobileIron Confidential
Auto configuration One-click authentication Data separation Mobile awareness Mobile identity Mobile data
11 MobileIron Confidential
Magic Quadrant for Enterprise Mobility Management Suites
Reprint available from MobileIron
Gartner ¡“Magic ¡Quadrant ¡for ¡Enterprise ¡Mobility ¡Management ¡ Suites” ¡by ¡Terrence ¡Cosgrove, ¡Rob ¡Smith, ¡Chris ¡Silva, ¡Bryan ¡ Taylor, John Girard, Monica Basso, 3 June 2014 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from MobileIron. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest
Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
12 MobileIron Confidential
Management of certificates for mobile devices
Proxy-based access, transmission, and installation of mobile certificates
US8494485
Granted Jul 23, 2013
Management of mobile applications
Distribution of mobile applications through an enterprise app store
US8359016
Granted Jan 22, 2013
Mobile activity intelligence
Collecting and analyzing mobile usage data
US8340633
Granted Dec 25, 2012
Virtual instance architecture for mobile device management systems
Underlying systems architecture
US8060074
Granted Nov 15, 2011
US8396465
Granted Mar 12, 2013
US8626147
Granted Jan 7, 2014
Selective management of mobile device data
Privacy policy and monitoring of business data on personal devices
US8695058
Granted Apr 8, 2014
US8731529
Granted May 20, 2014
13 MobileIron Confidential
Attendee profile
68% have a BYOD program 71% use identity certificates 73% have an enterprise app store 70% have deployed Android 37% use API for integration 55% will EOL BlackBerry by end of year
14 MobileIron Confidential
Trust-based security
The new economics of productivity
App Darwinism and the consumer cliff
Fundamental shifts
15 MobileIron Confidential
16 MobileIron Confidential
User Mode Kernel Mode Win32K.sys HAL Graphics Drivers Printer Drivers Win32 API NTDLL.DLL Logon Session Mgr
No user changes to kernel space stability, ease of update / patching Built-in management primitives simplicity, consistency Application sandboxing security, ¡no ¡app ¡conflicts ¡(“DLL ¡hell”)
User Mode Kernel Mode System Utilities Kernel Foundation Framework Video UIKit Framework Graphics Audio MDM Primitives
17 MobileIron Confidential
18 MobileIron Confidential
Policy enforcement Posture and trust OS integrity Closed-loop compliance Data containerization and DLP controls Identity Secure tunneling Access control Secure app-to-app communication Privacy controls
19 MobileIron Confidential
Enterprise app store Scalable delivery App reputation App control Deliver apps securely
Protect data-in-motion App-to-enterprise
SDK Wrapping
DLP controls Analytics Deletion Protect data-at-rest Authentication Authorization Configuration Encryption
SDK Wrapping
20 MobileIron Confidential
Source: Ponemon Institute, March 2014
Agility and preparedness for change Ample resources Enabling technologies Knowledgeable or expert staff Collaboration among business units Effective leadership A strong mobile security posture 6.58 6.01 5.60 5.13 4.24 3.97 2.61 Most important factors for mobile success (7 = most important to 1 = least important)
21 MobileIron Confidential