1 / 21

Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management

Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management. The mobile hirearchy of security needs. Step 1: Protect Data at Rest. Ensuring Selective Wipe (BYOD). Completely possible on iOS using native apps and e-mail.

shayla
Download Presentation

Lessons Learned from the First Generation of Mobile Apps Sean Ginevan, Product Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MobileIron - Confidential Lessons Learned from the First Generation of Mobile AppsSean Ginevan, Product Management

  2. The mobile hirearchy of security needs

  3. Step 1: Protect Data at Rest

  4. Ensuring Selective Wipe (BYOD) • Completely possible on iOS using native apps and e-mail. • E-mail possible on selective Android devices from Samsung, Motorola and HTC. Also possible with Touchdown 3rd party mail client. • Apps on Android possible with MobileIronAppConnect for Android

  5. Ensure Encryption • Provided through iOS Data Protection (requires PIN code). Third party options available • Available on Android 3.0 and above. Available on Samsung SAFE devices • Available through Android apps managed through AppConnect

  6. Ensure OS Integrity

  7. E-mail challenge: Open data with anything

  8. Selectively containerize attachment data

  9. About AppConnect

  10. Protect data in motion

  11. The life of a hyper-connected device

  12. E-mail access on a hyper-connected device

  13. Two-phased auth: Ensure secure connections

  14. Step 3: Deliver apps at scale

  15. Provide a secure app • Define application access by user identity • Prevent application binary access with certificate-based security • Selectively wipe application data as necessary

  16. App sizes are growing to drive rich experiences

  17. How does my corporate network feel with big apps?

  18. App Delivery Network: Offload app downloads High-speed, globally-distributed secure network for app distribution

  19. Requirements for enterprise app delivery

  20. MobileIron - Confidential MobileIron: NOC-Less Architecture Company BYOD Preserve Native User Experience Sentry Proxy Secure Manage App Store Cert/PKI Directory Network Content App Data Email

  21. Q&A. Thank You!

More Related