PERSPECTIVE. Enterprise mobile management a need or an option? Payal Patel, Jagdish Vasishtha (Jags)

Similar documents
WEB-APIs DRIVING DIGITAL INNOVATION

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

PULSE CONNECT SECURE APPCONNECT

Enterprise Mobile Management (EMM) Policies

Run the business. Not the risks.

WHITE PAPER. OAuth A new era in Identity Management and its Applications. Abstract

ENTERPRISE MOBILITY TRENDS

PrinterOn Mobile App MDM/MAM. Basic Integration Guide

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

PERSPECTIVE. Mobilizing SAP Enterprise Applications. Abstract. Suresh Santhana & Anoop Kumar

Mobile Security using IBM Endpoint Manager Mobile Device Management

Enterprise Mobility Management Buyers Guide

PERSPECTIVE. Data Virtualization A Potential Antidote for Big Data Growing Pains. Abstract

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

AT&T Global Network Client for Android

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Purchase Intentions Spring 2013 EMEA

INDIA The Changing Face of the Workplace: Going Light and Mobile

AirWatch for Android Devices for AirWatch InBox

BYOD: BRING YOUR OWN DEVICE.

Extreme automation of today s technological marvel - connected cars

WHITE PAPER. The Hybrid Cloud and Microsoft Azure

WHITE PAPER. Leveraging Database Virtualization for Test Data Management. Abstract. Vikas Dewangan, Senior Technology Architect, Infosys

VMware AirWatch and Office 365 Application Data Loss Prevention Policies

Securing Today s Mobile Workforce

The Device Has Left the Building

PERSPECTIVE. End-to-end test automation A behaviordriven and tool-agnostic approach. Abstract

SECURE, CENTRALIZED, SIMPLE

Bring Your Own Device (BYOD) Best Practices & Technologies

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Securing Office 365 with MobileIron

Mobilize with Enterprise Security and a Productive User Experience

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

The Future of Mobile Device Management

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

WHITE PAPER. Enhanced Unified Communication QoE through Software-defined networking (SDN) Abstract

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Balancing BYOD and Security. A Guide for Secure Mobility in Today s Digital Era

RHM Presentation. Maas 360 Mobile device management

Managing Devices and Corporate Data on ios

What is a mobile protection product?

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

The Black Box Institute

Citrix XenMobile and Windows 10

Augmenting security and management of. Office 365 with Citrix XenMobile

MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Unified Endpoint Management - Market Quadrant 2018

1 Introduction Requirements Architecture Feature List... 3

Embracing the Mobile Imperative

XenApp, XenDesktop and XenMobile Integration

Mobile Devices prioritize User Experience

Installation Guide for Android Revision v4.02, November 29th 2016

INSTALLATION AND SETUP VMware Workspace ONE

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

1 Introduction Requirements Architecture Feature List... 4

The Significant Role of European Union s GDPR in Data Governance

3-Part Guide to Developing a BYOD Strategy

Mobile Security Trends. Gregg Martin, Director, Mobile Security

This brief will explain the integration between AirWatch and TeleMessage. TeleMessage AirWatch Integration Brief Page 2 of 5

AirWatch Container. VMware Workspace ONE UEM

VMware AirWatch Android Platform Guide

Kony MobileFabric. Release Notes. On-Premises. Release 6.5. Document Relevance and Accuracy

JUNIPER NETWORKS PRODUCT BULLETIN

Changing IT Landscapes VIP Customer Day. Scott Crenshaw Senior Vice President of Strategy & Chief Marketing Officer

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Apple ios Enterprise Mobility Management (cloud based)

Is your application ready for ios? A QA perspective to ensure market readiness

Ch 7: Mobile Device Management. CNIT 128: Hacking Mobile Devices. Updated

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

POWERING DIGITAL MARKETING WITH SPEED AND REACH

Administering Jive Mobile Apps

The Mobilization of Cash Management The Journey, the Destination and the Future

Enterprise Security Solutions by Quick Heal. Seqrite.

White Paper BYOD 2.0 ENTERPRISE MOBILITY MANAGEMENT. SOTI.net. Copyright 2015 SOTI Inc. All rights reserved.

Commercial Product Matrix

KACE GO Mobile App 4.0. Release Notes

Pulse Workspace Appliance. Administration Guide

BlackBerry UEM is a Wise Investment for ABANCA

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

VMware AirWatch Mobile Application Management Guide Enable access to public and enterprise apps

Make security part of your client systems refresh

ENABLING QA THROUGH ANAPLAN MODEL TESTING

AirWatch for Android Devices for Skype for Business

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Mobile Device Management Solution

Deploy and Enjoy: Tableau Mobile at Enterprise Scale

Introduction to Xamarin Cross Platform Mobile App Development

Securing BYOD With Network Access Control, a Case Study

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

Administering Jive Mobile Apps for ios and Android

How a Global Insurance Provider in Japan uses BlackBerry UEM to Secure, Protect and Connect its Mobile Workforce

Pulse Secure Mobile Android Release 6.3.0

2016 BITGLASS, INC. mobile. solution brief

IBM. Configuration Guide. IBM MobileFirst Protect On-Premise. Version 2 Release 4

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

Transcription:

PERSPECTIVE Enterprise mobile management a need or an option? Payal Patel, Jagdish Vasishtha (Jags) Even as native platforms are growing tighter with security features, the enterprise mobile management solutions market is booming. If BYOD has to be enabled at SMB companies, with inbuilt solutions from Google and Apple, enterprises would need to support their mobility apps to withstand security threats and other mobile management needs.

Introduction The release of Android L at Google I/O 2014 and ios 8 at Apple WWDC 2014, were the two major announcements in the mobility world this year. Both had a lot of surprises for consumers, developers, and enterprises alike. Other parts of the mobility industry were buzzing with the boom of the mobile device management (MDM) market that is expected to be worth US$3.94 billion by 2019. EMM is not just limited to MDM or MAM now. With reference to Gartner Magic Quadrant Report on Enterprise Mobility Management Suite, June 2014, EMM offers much more than just device and application security. So what bodes well for enterprise mobile management (EMM) from both releases? Security is becoming more matured with newer OS version releases in terms of hardware and software. Core security features from these platforms were optional. Some of them were left to the end user to enable / disable the same. However, these are enforced by default now. Developers can build secured apps and solutions with the help of native platform APIs without relying on external MDM / MAM and other BYOD products. This PoV talks about: Native platforms focus on security features EMM industry happenings and what it means to the industry

Native platforms become more secured with every new OS release Along with every main OS release, Google and Apple also update security features. Apart from this, several security patches are applied as part of interim OS updates. Android 4.0 Android 4.2 Android 4.3 Device administration Password protection File system encryption Permission-based model Always-on VPN Certificate pinning Installed hardening OpenSSL cryptography SELinux to reinforce Sandbox KeyStore provision KeyChain is BoundKeyAlgo Restrict setuid from APPS Android 4.4 Android L ios 5 OS hardening Per user VPN SELinux enforcing mode Device monitoring warnings Default data encryption with keys not stored off-device Enforced Google Play services to get security firmware updates Android for Work powered by Divide acquisition and Samsung KNOX features Universal data controls Data protection improvements New features for MDM providers Email forwarding control S / MIME ios 6 ios 7 ios 8 Controlled installation of configuration profiles and certificates Auto removal of user profiles after a certain period Single app mode and global HTTP proxy Geo-fence use notification Touch ID fingerprint authentication Per application VPN Enterprise single sign-on Third-party app data protection Open in management and extended MDM Default data encryption with user passcode for all personal data Data management and content filtering Improved and more powerful device management capabilities Extended data protection with user passcode for pre-built apps such as Contact, Calendar, and Notes Greater security control for PPIM apps

EMM collaborations on the rise Some significant acquisitions have taken place in the last one year. This justifies two things: Realization for every industry to consider mobile-first strategies, and traditional security tech vendors to include mobility safeguards.

May 2013: Citrix made a strategic acquisition of Zenprise, one of the top five MDM vendors (as per Gartner s Magic Quadrant report), to provide device management capabilities. Citrix already had mobile market offerings through CloudGateway and ShareFile. November 2013: IBM acquired FiberLink, maker of the popular MaaS360 EMM service, and then made a deal with MAM vendor Apperian two weeks later. November 2013: Oracle acquired Bitzer Mobile, a MAM vendor, to support the growing need of BYOD. Blitzer offers BYOD purely in the form of application management without controlling much on the device side. December 2013: Even though a late entrant, Dell offered MDM, MAM, MCM, and end-point management after acquiring KACE, Wyse, SonicWALL, and Quest Software. Dell had a cohesive strategy in place with the plan of massive integration amongst these products. January 2014: Airwatch, one amongst the top five EMM vendors, got acquired by VMware for US$1.54 billion, making it the largest acquisition in the history of enterprise mobility. February 2014: Good technology, one of the biggest MDM/MAM vendors, acquired BoxTone to bolster its security needs. October 2014: Siris Capital acquired one of the very few network-approach-based EMM products Junos Pulse, from Juniper Networks and incorporated this joint venture in the name Pulse Secure, LLC. October 2014: Pulse Secure acquired the Israeli-based BYOD startup MobileSpace for US$100 million. MobileSpace is a new entrant in the EMM industry with its unique approach of managing in-house and public enterprise applications on Android. This can make BYOD more acceptable beyond ios devices. The latest Gartner Magic Quadrant report 2014 on mobile device management, suggests that big players such as Airwatch, Mobileiron, Citrix Solutions, SAP, Good Technology, IBM, Symantec, Microsoft, Sophos, and Soti are making this space difficult for SMB vendors. However, every enterprise has its own needs and one size does not fit all.

Is EMM a need or an option? Facts to consider Extended mobility The number of wearable units will be about 111.9 million by 2018, according to the IDC worldwide wearable survey. Many of these devices would have custom OS and would interact with native platforms as extended communication or with their standalone applications that can also have custom OS. How would it be possible for enterprises to manage them with only native OS offerings? With mobiles connected with auto, gears, entertainment, payment systems, and other embedded devices the need for massive data sharing and storage would increase. Enterprises would have to think about security and management in this connected world. Native platform offerings To compete with other platforms, native platforms keep releasing new features. This brings changes at a framework level. For instance, a closed network of Apple has introduced features such as data sharing across applications, touchid authentication usage access at the application level, handoff feature to access work from any connected ios devices, and access for external keyboard applications. Some of these features can open doors to further security threats. Android still remains very far from being considered a safe device for enterprise usage. While, Google attempts to address fragmentation, it also leads to more security issues. Android for Work covers only main OEMs such as HTC, Sony, Samsung, Motorola, and LG. When this platform gets populated with other manufacturers and models, how would they address security concerns? Development perspective Do developers follow best coding security practices while developing apps on platforms? Are architects and developers able to visualize security threats? Do all enterprises have a security framework that integrates seamlessly with all apps and ensures IT-defined security? All security frameworks have to go under revisions of development changes and testing with every new native OS version. Without an external EMM vendor, how many enterprises have a dedicated workforce to execute this? EMM offerings EMM does not help resolve BYOD but offers features such as: Multiple user support per device Runtime profile push to device Attack corporate data on device Inject enterprise policy changes to apps Devices and users tracking Application usage detection Crash analytics Uniformity in features, applying policies, defining security profiles and management console accessibility by administrators and IT departments would be possible only with EMM products and not through native platforms mobile management offerings. Imagine if enterprises have to enable BYOD for ios, Android and Windows mobile devices without external EMM solutions, they would have to select Google to manage Android devices, Apple to manage ios devices, and Microsoft to manage Windows devices. Even if Google supports other platform devices, it will secure and control those devices, only if those devices use GApps.

Conclusion Mobile management has given birth to several terms MDM (since 2009), EMM (since 2013), or mobile workforce (upcoming trend). There are many more such as security management, network service management, virtualization, app wrapping, SDK integration, and containerization. However, they ultimately are all part of the same enterprise mobility umbrella.

About the Authors Payal Patel, Senior Technology Architect, Infosys Payal Patel is a Senior Technology Architect with Infosys. She has over nine years of experience in mobile-related technologies and her interests and expertise include Mobile Management technologies. Jagdish Vasishtha (Jags) AVP and Head Enterprise Mobility Solutions, Infosys Jagdish Vasishtha (Jags) is responsible for all intellectual assets business of the unit. Overall he has 20+ years of experience in IT and Telecommunications. For more information, contact askus@infosys.com 2017 Infosys Limited, Bengaluru, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document. Infosys.com NYSE: INFY Stay Connected