BYOD Enterprise Mobility: Beauty & the Beast

Post on 15-Jul-2015

1.072 views 0 download

Tags:

Transcript of BYOD Enterprise Mobility: Beauty & the Beast

Enterprise Mobile Apps: Beauty & The Beast BYOD, Enterprise Integration, and Beautiful Mobile Apps

Chris O’Connor, CEO & Co-founder, Taptera

Matt McLarty, VP Client Solutions, Layer 7 Technologies

Housekeeping

Questions - Chat any questions you have and we’ll answer them at the end of this call

Twitter - Today’s event hashtag:

- #L7webinar

- Follow us on Twitter:

- @Layer7

- @Taptera

- @MattMcLartyBC

- @NowHearChris

facebook.com/layer7

layer7.com/blogs

layer7.com/linkedin

“Beauty”…

Visually appealing

Highly functional

Uncluttered

Intuitive

Smooth

Personal

Worldwide mobile trends ... - “By 2015, more U.S. Internet users will access the Internet through mobile devices than

through PCs or other wireline devices.” - “By 2015, the world's mobile worker population will reach 1.3 billion, representing

37.2% of the total workforce.” Source: IDC (September 2011, January 2012)

Trends driving the growth of Mobile in Enterprise IT ... - Consumerization, BYOD - Verticalization - New devices & device categories - Cloud-based mobile applications - Emerging M2M technologies

“Mobility is poised to become the next major IT paradigm. This gravitational shift will bring an array of opportunities and challenges to the

chief information officers in most enterprises.” Source: McKinsey (June 2012)

Beauty – The Mobile Enterprise

Better Productivity - Mobile devices have become personal extensions - BYOD enables work on one’s favourite “toy” - An appealing, usable, functional app further incents usage

Greater Accessibility - Personal mobile devices—tablets, smartphones—are ubiquitous - New form factor brings new capabilities—geo-location, presence, photo - Truly “always-on” - Speed and consumability compel usage

Why “Beautiful” Apps Matter

“The Beast”…

Security

- Identity management

- Application and data lifecycle (access → transport → storage → removal)

Deployment complexity

- New mobile apps

- Integration with existing applications and systems

Technology

- Platform fragmentation

- Pace of change

Governance

- Privacy issues

“The Beast” – The Challenges of Mobile

The Shedding of Tiers

Presentation

Business Logic

Data Access

Relational Database

Web Application

The Shedding of Tiers

Mobile Devices

Big Data

Presentation

Business Logic

Data Access

The Shedding of Tiers

Mobile Devices

Big Data

Presentation

Business Logic

Data Access

The Shedding of Tiers

Mobile Devices

Big Data

Presentation

Data Access Business and Data Services

The Shedding of Tiers

Mobile Devices

Big Data

Presentation

Business and Data Services

APIs: The New Perimeter

Mobile Devices

Big Data

Business and Data Services

Presentation BYOD

API

APIs: The New Perimeter

Mobile Devices

Big Data

Business and Data Services

Presentation BYOD

API

Beauty…

Beautiful Apps Are

INTUITIVE

Beautiful Apps Are

focused

Taptera Collateral Demo

Taptera Rooms Demo

Resulting In

Taming the Beast

A lightweight, low-latency mobile gateway for solving critical mobile challenges in the following areas:

Layer 7 Mobile Access Gateway

Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens

Create granular access policies at user, app and device levels

Build composite access policies combining geolocation, message content and other network attributes

Simplify PKI-based certificate delivery and provisioning

Identity: Extending Enterprise Identity to Mobile

+

Firewall

Identity Access Management

Protected Resource

Authorization & Resource Server

Mobile Devices & Apps

Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens

Create granular access policies at user, app and device levels

Build composite access policies combining geolocation, message content and other network attributes

Simplify PKI-based certificate delivery and provisioning

Identity: Extending Enterprise Identity to Mobile

+

Protect REST, SOAP and OData APIs against DoS and API attacks

Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging

Enforce FIPS 140-2 grade data privacy and integrity

Validate data exchanges, including all JSON, XML, header and parameter content

Security: Mobile Application Firewalling

Protect REST, SOAP and OData APIs against DoS and API attacks

Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging

Enforce FIPS 140-2 grade data privacy and integrity

Validate data exchanges, including all JSON, XML, header and parameter content

Security: Mobile Application Firewalling

Firewall

Enterprise Resources

Mobile Devices & Apps

Protect against attacks: DOS, SQL Injection, XSS, …

Hacker

Surface any legacy application or database as RESTful APIs

Quickly map between data formats such as XML and JSON

Recompose & virtualize APIs to specific mobile identities, apps and devices

Orchestrate API mashups with configurable workflow

Adaptation: Translate & Orchestrate Data & APIs

Surface any legacy application or database as RESTful APIs

Quickly map between data formats such as XML and JSON

Recompose & virtualize APIs to specific mobile identities, apps and devices

Orchestrate API mashups with configurable workflow

Adaptation: Translate & Orchestrate Data & APIs

Firewall

Legacy Enterprise Applications & Databases

Mobile Devices & Apps

Cache calls to backend applications

Recompose small backend calls into efficiently aggregated mobile requests

Compress traffic to minimize bandwidth costs and improve user experience

Pre-fetch content for hypermedia-based API calls

Optimization: Handle Scale

Cache calls to backend applications

Recompose small backend calls into efficiently aggregated mobile requests

Compress traffic to minimize bandwidth costs and improve user experience

Pre-fetch content for hypermedia-based API calls

Optimization: Handle Scale

Firewall

Enterprise Applications

Mobile Devices & Apps

Proxy and manage app interactions with social networks

Broker call-outs to cloud services like Salesforce.com

Bridge connectivity to iPhone, Windows and Android notification services

Integrate with legacy applications using ESB capabilities

Integration: Centralize Cloud Connectivity

Proxy and manage app interactions with social networks

Broker call-outs to cloud services like Salesforce.com

Bridge connectivity to iPhone, Windows and Android notification services

Integrate with legacy applications using ESB capabilities

Integration: Centralize Cloud Connectivity

Firewall

Cloud Services & Social Networks

On-Premise Enterprise Applications End User

Summary

BYOD and Mobility are sweeping Enterprise IT

Beautiful Apps will lead to greater productivity

Taptera’s enterprise apps are fast, beautiful and secure

Simplifying mobile access to the enterprise helps to keep apps beautiful

The Layer 7 Mobile Access Gateway solves key needs:

- Identity

- Security

- Adaptation

- Optimization

- Integration

Q&A

Questions?