Technology Council Discussion Ojas Rege, VP Strategy - - PowerPoint PPT Presentation

technology council discussion
SMART_READER_LITE
LIVE PREVIEW

Technology Council Discussion Ojas Rege, VP Strategy - - PowerPoint PPT Presentation

Technology Council Discussion Ojas Rege, VP Strategy ojas@mobileiron.com July 16, 2014 @orege (twitter) Past 1995+ 2010+ 1960+ 1980+ technology transitions Change the way people work Disrupt enterprise architectures Mainframe PC


slide-1
SLIDE 1

Technology Council Discussion

Ojas Rege, VP Strategy July 16, 2014

  • jas@mobileiron.com

@orege (twitter)

slide-2
SLIDE 2

2 MobileIron Confidential

Past technology transitions

Mainframe Era

1960+

PC Era

1980+

Internet Era

1995+

Change the way people work Disrupt enterprise architectures Create opportunities for innovation Mobile First Era

2010+

slide-3
SLIDE 3

3 MobileIron Confidential

In a Mobile First organization, users have access to every business process they need, on any device and app they want, with a secure experience they love.

slide-4
SLIDE 4

4 MobileIron Confidential

Device Security

BYOD (user choice and privacy) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement)

App & Content Enablement

1st gen of mobile apps Mobile documents Cloud protections

Business Transformation

New user & business experiences

The Journey to Mobile First

slide-5
SLIDE 5
slide-6
SLIDE 6

6

slide-7
SLIDE 7

Mobility unlocks human potential in the workplace

Company Vision

slide-8
SLIDE 8

8 MobileIron Confidential

Security and management platform for mobile apps, content, and devices

MobileIron architecture hypotheses (2008):

  • Multi-OS will be the standard
  • Data will be more important than voice
  • Users will choose their own technologies
slide-9
SLIDE 9

9 MobileIron Confidential

MobileIron: Purpose-built architecture

End user IT

Enterprise Resources AppConnect Ecosystem Apps@Work Docs@Work Web@Work Help@Work Tunnel Dataview Insight

Mobile Admin App

Sentry

Intelligent Gateway

Core

Management Console Reporting & Analytics tools

slide-10
SLIDE 10

10 MobileIron Confidential

Auto configuration One-click authentication Data separation Mobile awareness Mobile identity Mobile data

Ecosystem of choice

slide-11
SLIDE 11

11 MobileIron Confidential

Magic Quadrant for Enterprise Mobility Management Suites

Reprint available from MobileIron

Gartner ¡“Magic ¡Quadrant ¡for ¡Enterprise ¡Mobility ¡Management ¡ Suites” ¡by ¡Terrence ¡Cosgrove, ¡Rob ¡Smith, ¡Chris ¡Silva, ¡Bryan ¡ Taylor, John Girard, Monica Basso, 3 June 2014 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from MobileIron. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest

  • ratings. Gartner research publications consist of the opinions of

Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

2014

slide-12
SLIDE 12

12 MobileIron Confidential

History of innovation: MobileIron patents

Certificates

Management of certificates for mobile devices

Proxy-based access, transmission, and installation of mobile certificates

US8494485

Granted Jul 23, 2013

App store

Management of mobile applications

Distribution of mobile applications through an enterprise app store

US8359016

Granted Jan 22, 2013

Usage

Mobile activity intelligence

Collecting and analyzing mobile usage data

US8340633

Granted Dec 25, 2012

Architecture

Virtual instance architecture for mobile device management systems

Underlying systems architecture

US8060074

Granted Nov 15, 2011

US8396465

Granted Mar 12, 2013

US8626147

Granted Jan 7, 2014

BYOD

Selective management of mobile device data

Privacy policy and monitoring of business data on personal devices

US8695058

Granted Apr 8, 2014

US8731529

Granted May 20, 2014

slide-13
SLIDE 13

13 MobileIron Confidential

Attendee profile

MobileIron Global User Conference June 17-20, 2014 San Francisco

68% have a BYOD program 71% use identity certificates 73% have an enterprise app store 70% have deployed Android 37% use API for integration 55% will EOL BlackBerry by end of year

slide-14
SLIDE 14

14 MobileIron Confidential

Trust-based security

  • Patch-based (Win32) to trust-based (iOS, Android, Win8)
  • Identity and posture drive enterprise access and policy
  • Security moves from device to app to data

The new economics of productivity

  • High-stakes battle for data ownership
  • iCloud vs. Google Drive vs. OneDrive vs. Dropbox
  • Storage and productivity tools are the carrots

App Darwinism and the consumer cliff

  • Constant evolution of apps drives innovation and adoption
  • Consumer preference quickly shifts enterprise demand
  • Migration becomes an enterprise norm

Fundamental shifts

Ground rules are changing

slide-15
SLIDE 15

15 MobileIron Confidential

Evolution of multi-OS

slide-16
SLIDE 16

16 MobileIron Confidential

User Mode Kernel Mode Win32K.sys HAL Graphics Drivers Printer Drivers Win32 API NTDLL.DLL Logon Session Mgr

Win32

No user changes to kernel space stability, ease of update / patching Built-in management primitives simplicity, consistency Application sandboxing security, ¡no ¡app ¡conflicts ¡(“DLL ¡hell”)

User Mode Kernel Mode System Utilities Kernel Foundation Framework Video UIKit Framework Graphics Audio MDM Primitives

iOS / Android / WP 8

Evolution of operating system architecture

slide-17
SLIDE 17

17 MobileIron Confidential

Evolution of mobile security

Multiple, layered controls Each control is important and

  • verlaps with all other controls.

This ensures that the compromise

  • f one control will be

supplemented by the others. Controls are continuously evolving and getting better over time.

slide-18
SLIDE 18

18 MobileIron Confidential

NATIVE USER EXPERIENCE TRUSTED APP ECOSYSTEM

Policy enforcement Posture and trust OS integrity Closed-loop compliance Data containerization and DLP controls Identity Secure tunneling Access control Secure app-to-app communication Privacy controls

Device controls Network and authentication controls

slide-19
SLIDE 19

19 MobileIron Confidential

Distribute

Enterprise app store Scalable delivery App reputation App control Deliver apps securely

Tunnel

Protect data-in-motion App-to-enterprise

The evolution of app security

SDK Wrapping

Containerize

DLP controls Analytics Deletion Protect data-at-rest Authentication Authorization Configuration Encryption

SDK Wrapping

slide-20
SLIDE 20

20 MobileIron Confidential

Source: Ponemon Institute, March 2014

What factors would most contribute to your

  • rganization’s ¡ability ¡to ¡

maintain an effective mobile strategy over time?

Agility and preparedness for change Ample resources Enabling technologies Knowledgeable or expert staff Collaboration among business units Effective leadership A strong mobile security posture 6.58 6.01 5.60 5.13 4.24 3.97 2.61 Most important factors for mobile success (7 = most important to 1 = least important)

The evolution of IT

slide-21
SLIDE 21

21 MobileIron Confidential

  • n www.glassdoor.com
slide-22
SLIDE 22