Upload
maas360-by-fiberlink
View
300
Download
2
Tags:
Embed Size (px)
Citation preview
© 2015 IBM Corporation
IBM Security
1 © 2015 IBM Corporation
Android M New Features for Feasting on Your Data
Jared Solomon Frank Schloendorn QA Engineer Director, Quality Assurance
IBM Security | June 4, 2015
© 2015 IBM Corporation
IBM Security
2
Agenda
A Brief History of Android
Coming Soon to a Phone Near You – New Features in M
What Else is New? – Other New Google Announcements
Enterprise Security
Q&A
© 2015 IBM Corporation
IBM Security
4
Release History
Cupcake 1.5 – April 2009
Donut 1.6 – September 2009
Eclair 2.0 – October 2009
Froyo 2.2 – May 2010
Gingerbread 2.3 – December 2010
Honeycomb 3.0 (Tablets only) – February 2011
Ice Cream Sandwich 4.0 – October 2011
Jelly Bean 4.1 – July 2012
Kit Kat 4.4 – October 2013
Lollipop 5.0 – November 2014
M – Q3
© 2015 IBM Corporation
IBM Security
5
Where’s the Snacktastic Name?
Name will be announced at official release
Current version is an incomplete preview
© 2015 IBM Corporation
IBM Security
7
Better Screen-Off Battery Life
Doze uses the device accelerometer to detect when the device is not being used – Over time, restricts background tasks and data – Will still respond to alarms and high priority
messages – Normal behavior resumes when device is plugged
in or moved
App Standby determines what apps haven’t been used in a while – Restricts background data for these apps – Normal behavior resumes when app is launched or
device is plugged in.
© 2015 IBM Corporation
IBM Security
8
Auto Backup for Apps
The device will now automatically back up data for the user’s app
Data is stored in the user’s Google Drive account – Doesn’t count against storage space
Data is restored when the app is reinstalled, either on the original device or a new one
Backups run every 24 hours over WiFi while charging Improved Volume Controls
Expanded Volume Control Panel – Quick access to Media and Alarm Volume
Silent Mode Improvements – New “Alarms Only” Mode – “Alarms Only” is default
New “Do Not Disturb” Quick Toggle
© 2015 IBM Corporation
IBM Security
9
App Permissions
Apps request permissions when they need them No longer have to accept a laundry list of permissions
during installation Can be revoked at any time Available for apps made for M “Legacy Apps” can have permissions revoked
Biometric Security
Official support for Fingerprint scanners Unlock your device or your app
© 2015 IBM Corporation
IBM Security
10
Google Now on Tap
New contextual awareness for Google Now Aware of information on your screen Information that’s immediately relevant Simple to activate
© 2015 IBM Corporation
IBM Security
11
Chrome Integration
Chrome now supports Custom Tabs Use Chrome as in-app browser Add your own options Bring Chrome functionality to your app
© 2015 IBM Corporation
IBM Security
12
Android For Work Enhancements
Read-Only Wi-Fi configurations
Corporate app network usage visibility
Unified VPN app configuration
– Cisco, F5, Pulse, GlobalProtect
Enterprise Contacts integration
Corporate Owned Single Use (COSU) devices can be quickly configured to be locked to single app
Remote update management – apps and system
© 2015 IBM Corporation
IBM Security
13
Bug Fixes!
According to Google, over 1000 bugs have been resolved in this release
Smoother, more reliable experience
© 2015 IBM Corporation
IBM Security
15
Android Wear
Wi-Fi Support Google Maps on your watch Improved UI navigation
– Gestures and Workflows Always On Apps Emoji Support
© 2015 IBM Corporation
IBM Security
16
Chrome Smart Lock
Password sharing between mobile and PCs Save password on your PC Automatic sign in for apps on mobile
© 2015 IBM Corporation
IBM Security
17
Google Photos
Unlimited High Quality Photo Backup
Browsing Improvements – View by Moment, Day, or Month – Pinch to Zoom – Drag to select
Automatic Categorization – Group by person – Group by places – Group by things
• Types of animals • Types of vehicles • Types of landscapes • Food
Improved Sharing
© 2015 IBM Corporation
IBM Security
18
Android Pay
Go to the store. Use your phone to buy things
Easily shop online No longer uses Virtual Mastercard New token-based authentication. Vendors
do not get your credit card info.
© 2015 IBM Corporation
IBM Security
19
Project Brillo
Android for devices that aren’t phones “Internet of Things” Control other devices with your phone
– Unlock doors – Control lights – Turn off the oven – And more!
© 2015 IBM Corporation
IBM Security
21
What We Need to Prepare For
App Backup – Data is encrypted, but still uploaded – Issues restoring data on certain apps
Runtime Permissions – Function properly without certain permissions – Can we enforce required permissions?
Doze and App Standby
– How will this impact your app performance?
Fingerprint Scanner – Passcode concerns
New OS Version – Making sure everything else still works
© 2015 IBM Corporation
IBM Security
23
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.