23
© 2015 IBM Corporation Android M New Features for Feasting on Your Data Jared Solomon Frank Schloendorn QA Engineer Director, Quality Assurance IBM Security | June 4, 2015

Android M: New Features for Feasting on Your Data

Embed Size (px)

Citation preview

© 2015 IBM Corporation

IBM Security

1 © 2015 IBM Corporation

Android M New Features for Feasting on Your Data

Jared Solomon Frank Schloendorn QA Engineer Director, Quality Assurance

IBM Security | June 4, 2015

© 2015 IBM Corporation

IBM Security

2

Agenda

A Brief History of Android

Coming Soon to a Phone Near You – New Features in M

What Else is New? – Other New Google Announcements

Enterprise Security

Q&A

3 © 2015 IBM Corporation

A Brief History of Time Android From C to M

© 2015 IBM Corporation

IBM Security

4

Release History

Cupcake 1.5 – April 2009

Donut 1.6 – September 2009

Eclair 2.0 – October 2009

Froyo 2.2 – May 2010

Gingerbread 2.3 – December 2010

Honeycomb 3.0 (Tablets only) – February 2011

Ice Cream Sandwich 4.0 – October 2011

Jelly Bean 4.1 – July 2012

Kit Kat 4.4 – October 2013

Lollipop 5.0 – November 2014

M – Q3

© 2015 IBM Corporation

IBM Security

5

Where’s the Snacktastic Name?

Name will be announced at official release

Current version is an incomplete preview

6 © 2015 IBM Corporation

Coming Soon to a Phone Near You New Features in M

© 2015 IBM Corporation

IBM Security

7

Better Screen-Off Battery Life

Doze uses the device accelerometer to detect when the device is not being used – Over time, restricts background tasks and data – Will still respond to alarms and high priority

messages – Normal behavior resumes when device is plugged

in or moved

App Standby determines what apps haven’t been used in a while – Restricts background data for these apps – Normal behavior resumes when app is launched or

device is plugged in.

© 2015 IBM Corporation

IBM Security

8

Auto Backup for Apps

The device will now automatically back up data for the user’s app

Data is stored in the user’s Google Drive account – Doesn’t count against storage space

Data is restored when the app is reinstalled, either on the original device or a new one

Backups run every 24 hours over WiFi while charging Improved Volume Controls

Expanded Volume Control Panel – Quick access to Media and Alarm Volume

Silent Mode Improvements – New “Alarms Only” Mode – “Alarms Only” is default

New “Do Not Disturb” Quick Toggle

© 2015 IBM Corporation

IBM Security

9

App Permissions

Apps request permissions when they need them No longer have to accept a laundry list of permissions

during installation Can be revoked at any time Available for apps made for M “Legacy Apps” can have permissions revoked

Biometric Security

Official support for Fingerprint scanners Unlock your device or your app

© 2015 IBM Corporation

IBM Security

10

Google Now on Tap

New contextual awareness for Google Now Aware of information on your screen Information that’s immediately relevant Simple to activate

© 2015 IBM Corporation

IBM Security

11

Chrome Integration

Chrome now supports Custom Tabs Use Chrome as in-app browser Add your own options Bring Chrome functionality to your app

© 2015 IBM Corporation

IBM Security

12

Android For Work Enhancements

Read-Only Wi-Fi configurations

Corporate app network usage visibility

Unified VPN app configuration

– Cisco, F5, Pulse, GlobalProtect

Enterprise Contacts integration

Corporate Owned Single Use (COSU) devices can be quickly configured to be locked to single app

Remote update management – apps and system

© 2015 IBM Corporation

IBM Security

13

Bug Fixes!

According to Google, over 1000 bugs have been resolved in this release

Smoother, more reliable experience

14 © 2015 IBM Corporation

What Else is New? New in Android, and Not Just M

© 2015 IBM Corporation

IBM Security

15

Android Wear

Wi-Fi Support Google Maps on your watch Improved UI navigation

– Gestures and Workflows Always On Apps Emoji Support

© 2015 IBM Corporation

IBM Security

16

Chrome Smart Lock

Password sharing between mobile and PCs Save password on your PC Automatic sign in for apps on mobile

© 2015 IBM Corporation

IBM Security

17

Google Photos

Unlimited High Quality Photo Backup

Browsing Improvements – View by Moment, Day, or Month – Pinch to Zoom – Drag to select

Automatic Categorization – Group by person – Group by places – Group by things

• Types of animals • Types of vehicles • Types of landscapes • Food

Improved Sharing

© 2015 IBM Corporation

IBM Security

18

Android Pay

Go to the store. Use your phone to buy things

Easily shop online No longer uses Virtual Mastercard New token-based authentication. Vendors

do not get your credit card info.

© 2015 IBM Corporation

IBM Security

19

Project Brillo

Android for devices that aren’t phones “Internet of Things” Control other devices with your phone

– Unlock doors – Control lights – Turn off the oven – And more!

20 © 2015 IBM Corporation

Enterprise Security & Development What Do We Need to Worry About?

© 2015 IBM Corporation

IBM Security

21

What We Need to Prepare For

App Backup – Data is encrypted, but still uploaded – Issues restoring data on certain apps

Runtime Permissions – Function properly without certain permissions – Can we enforce required permissions?

Doze and App Standby

– How will this impact your app performance?

Fingerprint Scanner – Passcode concerns

New OS Version – Making sure everything else still works

22 © 2015 IBM Corporation

Questions & Answers

© 2015 IBM Corporation

IBM Security

23

www.ibm.com/security

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.