20
Enterprise Mobility

Advaiya enterprise mobility whitepaper

Embed Size (px)

DESCRIPTION

This paper discusses trends and challenges affecting enterprise mobility and how organizations can effectively build and deploy around enterprise mobility framework

Citation preview

Page 1: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page 2: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page ii Advaiya Solutions Pvt. Ltd.

Contents

Introduction ........................................................................................................................................................... 1

Trends, Challenges, and Drivers........................................................................................................................... 2

Enterprise Mobility Maturity and Optimization Framework ............................................................................ 4

Key Mobility Considerations and Vendor Characteristics ................................................................................. 6

Conclusion............................................................................................................................................................ 12

References ............................................................................................................................................................ 13

Glossary ................................................................................................................................................................ 15

Page 3: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page i Advaiya Solutions Pvt. Ltd.

Introduction

IT grapples with the need to extend enterprise architecture to include mobility considerations

making personal devices as business tools. Mobile devices bring enterprise data to new roles,

supporting a seamless mobile experience. Businesses pursue opportunities to stay ahead of

the competition, providing users with secure and compliant information, anytime and

anywhere on mobile infrastructure. The primary research of current landscape of mobile

solutions for varying business needs provided with the mobility optimization framework and

considerations for mobile app management.

Various analyst firms and IT firms including IDC, Gartner, Aberdeen, Intel etc. have carried our

researches and conducted surveys on Enterprise Mobility. In one such study, Gartner observed

that consumerization and the ubiquity of connected smart devices, people's behavior has

caused a convergence of these forces. A Nexus of converging forces — social, mobile, cloud and

information — is building upon and transforming user behavior while creating new business

opportunities. Mobile computing is forcing the biggest change to the way work. It changes how

they spend their day. Mass adoption forces new infrastructure. It spawns new businesses. And it

threatens the status quo1. The innovation rate in mobile devices, social software and cloud

computing is accelerating faster than the enterprise adaptation rate. IT organizations that fail to

adapt to this new reality will lose their relevance in the era of pervasive mobility. 2

With this comes the responsibility for Businesses to consider mobility management as

important as datacenter management. This is the core premise of study – that enterprise

mobility management deals with Mobile Strategy and Roadmap, Mobile Device Management,

Mobile Device Security, Mobile Device Policy, Enterprise Application Enablement, Mobile App

Management. We have studied mobility trends and studies from various analysts, mobility

solutions of leader vendors and developed Enterprise Mobility framework with three maturity

levels (Mobile aware, Mobile enabled, Mobile enterprise) of these capabilities through which

organizations can advance with a strategic roadmap and accrue measurable business value.3

This paper discusses trends and challenges affecting enterprise mobility and how

organizations can effectively build and deploy around enterprise mobility framework

1 Gartner, The Nexus of Forces: Foundational Research for the Technical Professional, June 2012,

http://www.gartner.com/technology/research/technical-professionals/ne xus-of-forces.jsp

2 Gartner, Enterprise Mobility and Its Impact on IT, April 2012, http://www.gartner.com/technology/research/technical-professionals/m obility.jsp

3 Aberdeen Group, Enterprise Mobility Management 2012, April 2012,

http://content.maas360.com/www/content/ar/Aberdeen_SoMoClo_2012.pdf

Analyzing mobility infrastructure

and architecture helps enterprise

to quickly assess the technology

landscape, current trends and

make company data available in

real time with device support

across various platforms.

Page 4: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page ii Advaiya Solutions Pvt. Ltd.

Trends, Challenges, and Drivers

In today’s changing markets, enterprises face several challenges in creating an enterprise mobility strategy. The challenge is not building

mobile application but providing mobile application platform. They need to slowly move up the maturity curve in adopting mobi lity.

Trends

70% of mobile professionals will conduct their work on personal smart devices by 20184

BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring

your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments

to make it work.5

Enterprise tablet adoption will grow by 50 percent annually. In addition, 71 percent of workers surveyed use tablets as an additional

device rather than a computer replacement6

More than 40 percent of all enterprise web applications will have mobile apps by 2014, and 90 percent of companies will support

corporate apps on mobile devices by 20147

Expect MDM to fade from marketing language in 2013, replaced by MAM (mobile application management) or MEM (mobile

enterprise management).8

2013 will bring a lot more integration between mobile apps and the cloud. Wherever possible, you won't have data that resides on

the device.9

Security, manageability, and remote wipe capabilities are top requirements for a successful BYOD program10

Drivers11

4 Gartner, Bring Your Own Device, 2013

http://www.gartner.com/technology/topics/byod. jsp 5 Gartner, The Impact of BYOC on Management and Support, October 2011

http://www.gartner.com/id=1820215 6 ClickSoftware.com, 2013

http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 7 Gartner, 2013

http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 8 Information Week, 2013

http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-pre dict ions-for-20/240145435 9 451 Research – Hazelton, 2013

http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-pre dict ions-for-20/240145435?pgno=2 10 Intel, Insights on the Current State of BYOD, October 2012

http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/consumerization-enterprise-byod-peer-research-paper.pdf 11 Cognizant, F orces Driving Enterprise Mobility http://www.cognizant.com/insights/perspectives/forces-driving-enterprise-mobility

Support flexible

workstyle to drive employee

satisfaction

Enhancing remote productivity

Increased Use of Mobility by Consumers

Page 5: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page iii Advaiya Solutions Pvt. Ltd.

Challenges 12

12 IQT, The Challenges of Enterprise Mobility

http://www.iqt.org/portfolio/on-our-ra dar/Enterprise_mobility.pdf

Securing corporate Information

systems with increase in offsite work through

personal devices

Integrating mobile apps with

enterprise systems

Supporting variety

of mobile devices and rapidly changing mobile

technology

Managing what’s on the mobile

device

Page 6: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page iv Advaiya Solutions Pvt. Ltd.

Enterprise Mobility Maturity and Optimization Framework

Optimization is a structured, systematic process of assessing mobile infrastructure and architecture maturity across IT and Business

world. The process begins with where the mobility infrastructure is and where the enterprise wants it to be. Enterprise mobility

framework defines 3 maturity phases as Mobile Aware, Mobile Enabled and Mobile Enterprise. The Enterprise Mobility Maturity Model

capabilities, maturity definitions and features are illustrated below.

Capability Mobile Aware Mobile Enabled Mobile Enterprise

Mobile Strategy and

Roadmap

Agreed upon strategic

direction, no mobile strategy

roadmap

Strategy published and

communicated, bottom-

up driven roadmap

Mobile strategy drives the

mobility roadmap, measured

results feed the strategy

Mobile Device Management Limited platform specific

management

Platform specific,

comprehensive device

management

Centrally managed, policy driven,

integrated device management

Features Web based authentication

Corporate device provisioning by IT

Certificates, passcodes, multifactor authentication, single sign-on to apps and data

Device enrollment through web-portal, e-mail, over-the-air using smartphones/tablets

application, or SMS with OTP authentication.

Central policy management system for endpoint devices

Predictive analytics, proactive alerting, real-time diagnostics and problem resolution

Remote support and troubleshooting including VOIP and chat

AD/LDAP based authentication

Personal device provisioning and self-service enrollment

Management console with strong dashboard and detailed reporting capabilities (role-based

views)

Mobile Device Security Limited platform specific device

security

Cross platform mobile

device security

Fully managed cross platform

mobile device security

Features Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,

context-aware policies, app blacklist/whitelist

Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,

context-aware policies, app blacklist/whitelist

Encryption policy (phone, SD)

Lockdown security (camera, SD, Bluetooth, Wi-Fi)

Password enforcement

Remote lock and wipe

Mobile

Aware

Unmanaged user devices used in the organization in limitied capacity

Use of pilot application

Mobile

Enabled

Partially managed devices connect to limited company resources

Handful of mobile applications

Mobile

Enterprise

Fully managed employees and company devices participate in enterprise

workflow

1 2 3

Page 7: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page v Advaiya Solutions Pvt. Ltd.

App inventory, distribution

Real-time, permission-based remote control

Enterprise data boundary with selective wipe and privacy policies

Access Control (Sentry) with ActiveSync connection activity, device visibility and blocking of

email access

Certificate distribution

Secure administration with role-based access, group-based actions and persistent logs and

audit trails

Lost phone recovery (locate and map)

Mobile Device Policy Platform specific mobile device

policy

Established cross platform

device policies

Fully defined & enforced mobile

device policies across all devices

Features Web content filtering and URL filtering on mobile devices

Mobile policies based on OS and patch levels, passcodes, device ownership, apps and device

resources, platform-specific policies, encryption, device status and location

Quarantine noncompliant devices based on policies, devices, operating system versions, and

compliance violation

Enterprise Application

Enablement

Limited enablement of select

enterprise functions

Key enterprise functions

and processes are mobile

enabled

Mobility enables business

process innovation

Features Embedded VPN and sandbox that can control and encrypt application traffic.

App wrapping to import mobile apps

Enables smartphone/tablet users to subscribe to enterprise document and database updates

through the enterprise application distribution function

SMS Integration with other services/Applications using APIs

Application authorization even on platforms that do not support blacklisting /whitelisting

Mobile App Management Unmanaged mobile Apps Unmanaged commercial

and managed custom

mobile apps

Fully managed mobile business

apps portfolio

Features Enterprise App Catalogues

Advanced distribution rules selecting eligible devices based on both inclusion and exclusion

criteria

Push updated versions automatically for on-demand apps

On-demand installation using app catalog

Public Appstore integration

Prevent data backup and automatically remove apps on un-enrollment

Track and view installed/approved/blacklisted applications at the device/user level

Remotely manage application settings on supported apps through Application Profiles

Container approach to separate personal versus corporate data

Secure business apps and data with encryption and mobile DLP technologies

Granular policy-based management and access controls

Overall Unmanaged consumer mobile

devices used in organization

in limited capacity

Partially managed

devices connect to

limited company

resources

Fully managed company and

employee devices participate

in enterprise workflow

Page 8: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page vi Advaiya Solutions Pvt. Ltd.

Key Mobility Considerations and Vendor Characteristics

There are three leading platforms in the mobile segment—smartphones, tablets, and notebooks PCs - and new In-Stat (www.in-

stat.com) research forecasts that this category of mobile “magnet platforms” will grow at a CAGR of 25.7% through 2015 as com pared

to 8.7% for the overall mobile market.

Employees use smartphones, tablets or personal devices at workplaces to access corporate networks, business applications and data to

maximize connectivity and productivity. This demands for the need of secure and compliant access to applications and data on various

mobile platforms.

The mobility landscape in India is rapidly evolving. Enterprises are embracing mobility to improve work productivity and experience of

customers.13

The research lays emphasis on the essentials of enterprise mobility and its integration i.e. Mobile Device Management, Contro lled

Services Exposure, SMS based Service Invocation, Enterprise Mobility Gateway and Business Service Interface.

14Mobile Device Management: Mobile device management (MDM) solutions help enterprises manage smartphones and tablets by

providing centralized, multivendor device management that results in lower risk and improved cost of ownership. Although the MDM

market is fragmented with point solutions, it is evolving toward broader solutions that will eventually support application, security,

policy, and device and service management. Important MDM features that enterprises need to consider:

Device Registration/De-registration

Bring Your Own Device

Authentication Methods

Vendor Characteristics

Enterasys Mobile IAM

13 NASSCOM, Mobility on the Move in India, Zinnov Managemen Consulting

http://www.nasscom.org/mobility-move-india?fg=162893 14 Gartner, Mobile Device Management Evaluation Criteria, January 2012

http://www.gartner.com/DisplayDocument?docC ode =217549&ref=g_fromdoc

Key Trends

ERP, CRM, SCM, along with email solutions

expected to fuel the growth of the mobility

market Application maturity increase from the

current dashboarding level to complete back-end integration

Declining mobility solutions costs are enabling SMBs to join the enterprise

mobility bandwagon

India’s mobility landscape:

840 million active mobiles operational

15% of smartphone market share

About 15 million mobile subscribers added every month

Laptop market is growing at a CAGR of 50 per cent

PC penetration in urban households have reached 38 per cent

There is an installed base of 25 million computers in India

Page 9: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page vii Advaiya Solutions Pvt. Ltd.

Simplified onboarding and provisioning

Secure, IT controlled BYOD solution with predictable network experience

Web based registration, Kerberos Snooping or active Authentication via 802.1X

AirWatch’s Mobile Device Management

Employee owned and corporate owned devices deployed by IT admin or end user

Support for all major mobile platforms for a flexible BYOD program

Directory-based authentication, Via AD/LDAP, SAML, smart-card or tokens, two-factor user authentication

MaaS360 Mobile Device Management

Over the air (OTA) enrollment requests (SMS, emails, custom URL)

Device decommissioning by removal of corporate data

Corporate and employee owned (BYOD) device

Authenticate against Active Directory (AD)/ Lightweight Directory Access Protocol (LDAP), using a one-time passcode, or with

Security Assertion Markup Language (SAML)

Boxtone

OTA automated device self-provisioning

Enterprise-wide device Activate/Deactivate/Wipe/Quarantine

Users’ personal devices for BYOD

ProMDM

OTA Device enrollment using iPhone/iPad application, or SMS with OTP authentication.

BYOD with separation of private and business information based on multiple profiles

Simple Certificate Enrollment Protocol (SCEP) certificates for authentication

Case Study

Henry Ford Health System has deployed AirWatch − which currently secures and ensures BYOD compliance for approximately 3,000

corporate-owned mobile devices and 2,500 personal devices.

“Much of what we do as an IT organization is in response to what our customer base wants. With the capabilities of the [MDM platform], it

fulfills what we need to do. We’re very pleased with the product and the way it is in our environment.” - Michael Staroscia, Client Technical

Services Manager

http://bit.ly/ZL1GQq

Controlled Services exposure : Controlled Services exposure solutions help enterprises to expose applications and services (or just the

specific features) to users and devices through a specific set of rules. This helps enterprises cost effectively provide secu rity, compliance,

application provisioning and management for BYOD environments. Important features that enterprises need to consider:

Centralized user access management

Application Level Policy

User Level Policy

Device Level Policy

Vendor Characteristics

Enterasys Mobile IAM

End-to-end visibility and control over access levels of applications, in multi-vendor infrastructures

identity and role based policy management

Mobile device compliance at network layer

AirWatch’s Mobile Device Management

Page 10: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page viii Advaiya Solutions Pvt. Ltd.

Configure device security policies based on device ownership

Set up enrollment restrictions to block users or devices based on platform, version, etc.

Require acceptance of Terms of Use before granting access

Enforce restrictions on device features, apps and web browsing

Detect compromised devices and perform automated actions

Restrict native apps on a device, including YouTube, Siri and Camera

Whitelist or blacklist publicly available apps

Enforce application compliance policies and monitor status

Control user’s ability to edit, share or open files in unauthorized applications

Require user to view content online or prevent download over cellular connection

Restrict document access to a specific location through geofencing

Absolute Manage for Mobile Device

Publish a list of approved apps onto each device and provide a single-click download/install process

Silently install/remove apps using management APIs

Policies to define window of time to access secured documents and corporate networks.

Policy-locked configuration profiles to stop non-compliant devices

AT&T Mobile Device Management

Centrally manage user roles and access controls

Set device policies per job function and user group

Case Study

City of Redlands Arms and Manages Mobile Devices for its Officers on Patrol. Now the force has access to critical information,

regardless of where they are, with the security that is demanded.

“What AT&T proposed to uswas MobileIron, a centralized platform for managing all our devices remotely. It immediately solved the biggest

issue, which was getting the 175 devices authenticated to use our Departmental apps. It also created our own private app store that makes

our apps available to every device, as needed. Ad we continue to develop our custom applications and push more and more information

out to the mobile devices, we need to make sure that sensitive information isn’t accidentally made public or put into the wrong hands.”

http://soc.att.com/VcNuwZ

SMS based services invocation: SMS based services invocation solutions help enterprise integrate text/voice/multimedia messages to

enhance application value and business to harness the power of SMS for application interface and usability enhancements, customer

interaction, marketing etc. Important features that enterprises need to consider:

SMS Integration with other services/Applications using APIs

2 way SMS

Bulk SMS

Vendor Characteristics

SMS Global

Seamless integration with applications, including web sites, intranets, CRM's, ERP's and other corporate software through APIs

Support of 2-way SMS for one-to-one communication with customers

Set up a personalized sender ID for SMS

Support of bulk SMS and WAP Push and VCard SMS

ZNI

Platform independent APIs to integrate with applications for better control and functionality

Used for lead generation and receiving feedbacks from customers

Supports bulk SMS packages that can be sent directly from Excel sheet

Page 11: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page ix Advaiya Solutions Pvt. Ltd.

SMS Matrix

Send bulk message in fraction of seconds

Integration with legacy applications via use of simple APIs

Handles 2-way messaging using SMS, Voice and Text-to-Speech worldwide

Offers bulk FAX broadcasting

Bulk SMS scheduling

Easy SMS: Communicator 2

Integrate with any backend system or application seamlessly with wide range of APIs

Use of 2-way messaging and short codes for direct line of communication

Set priority in bulk SMS while sending high volume of messages

Send email to SMS to send out reminders

Enterprise Direct SMS

Standard protocols to integrate with enterprises' applications

Supports automated 2-way SMS communication channel for customers

Personalized short codes without rental or purchase fees

Multiple plans for different type of user

Mozeo Text Messaging

Allow mobile customers share their thoughts and pictures in real time

Text message marketing through use of unique mobile keywords for interaction

Supports mobile voting for an event, website or any marketing collaterals

Bulk SMS text blasting through online account center

Case Study

Five Tuition, needed an easy and cost effective way to communicate with a growing number staff and an expanding clientele base. With

SMSGlobal's API, Five Tuition integrated SMS into their existing database, to contact students, parents and staff via SMS.

"With growing communication demands, we needed to find a method of communication that would integrate seamlessly with our

current system. Following the very simple online instructions, and with limited programming skills, I was able to successfully integrate

our existing system with SMSGlobal's HTTP API. Our staff can now send bulk SMS's to tutors, students, or parents with ease." Peter

Hanley, Manager, Five Tuition.

http://bit.ly/Wjz2oi

Enterprise Mobility Gateway: Enterprise Mobility gateway solutions helps organizations to selectively distribute enterprise application

and data with remote users accessing enterprise information through variety of personal and corporate devices. Important features that

enterprises need to consider:

Enterprise application availability for mobile user

User Access Controls

Users/Device Authentication

Vendor Characteristics

Symantec App Center

Policy enforcement for defining access controls for enterprise

Enforce policies like user authentication, re-authentication, data encryption on local storage access, off-line access

Distribution of apps with corporate security and branding wrappers

NetScaler Access Gateway

Seamless point of secure remote access

Page 12: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page x Advaiya Solutions Pvt. Ltd.

Supports single sign-on capabilities for all applications and data

Manage access control and set polices based on identity, location and the configuration of the endpoint device

User and device authentication based on the active directory

WSO2 Cloud Gateway

Allows user to selectively publish services and data to the cloud in secure environment

User based authentication and authorization.

Administrator to manage access control and set polices based on user identity and roles

Roverapp

Connect mobile devices with companies intranet applications securely without VPN

Access corporate applications and data based on their access policies and controls

Supports advance authentication methods

Case Study

To enable interactions between the mobile POS systems and back-end software, ODEL has used components of the WSO2 Mobile

Services Gateway Solution. This mobile POS systems serves as an express checkout option for those customers using a credit card to

purchase five or fewer items.

“WSO2 is a valuable partner in enabling us to offer new solutions like the mobile POS systems that help drive customer loyalty and set us

apart in the market.” – Thilanka Kiriporuwa, ODEL head of human resources and operations.

http://bit.ly/qtqmxH

Business Service Interface : Business Service Interface solutions allow organizations to expose internal applications through

intermediary services to facilitate effective business collaboration in B2B and remote working scenarios. Important features that

enterprises need to consider:

Messaging format supports

API support

Integration solution library

Vendor Characteristics

e-Zest Enterprise Application Integration

Supports Services oriented architectures (SOA’s) Messaging

Object Request Broker (ORB), Remote Procedure Call (RPC) and Subscribe based communication integration

iWay Application System Adapters

Supports transportation over messaging software like WebSphere MQ and JMS

Provides direct links into packaged applications using a variety of APIs

Enterprise Application Integration

Interactions with SaaS-based data via published APIs

Drag and drop assembly of application integration flows

Easily modifiable snaps based on open and standardized development environment

MuleSoft Connectors

Instant API connectivity to most applications and services

Provision of a library of repeatable integration solutions

EDI Application Integrator

Powerful architecture to build a library of application program interfaces (API’s)

Page 13: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xi Advaiya Solutions Pvt. Ltd.

EDI Application Integrator for drag and drop mapping

Jitterbit Application Integration Solutions

Application integration solutions supporting Enterprise Service Bus (ESB), Service Oriented Architecture (SOA), and point-to-point

integration architectures

Case Study

ACAL BFi turned to Jitterbit to replace its unreliable coding-based integration with a standard platform to reduce the costs and

resources required to provide a single view of the company’s ERP and CRM data.

“Our previous integration tools were very slow and needed constant monitoring. In contrast, Jitterbit provided us with a st andard platform

on which to build our integration projects, allowing us to quickly and cost-effectively synchronize data between our ERP and CRM

applications. I have been able to configure and manage Jitterbit by myself, while giving the rest of the company an up -to-date view of all

our pertinent data within the application they use on a daily basis.” -Keith Lovern, Technical Operations

http://bit.ly/15kS2Ds

Page 14: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xii Advaiya Solutions Pvt. Ltd.

Conclusion

Consumerization of IT has significantly increased the use of mobile devices in everyday life. With this widespread use of personalized

devices to access corporate data, enterprise mobility management has gain prominence across various business verticals. With the

Flexible work style scenarios enterprise apps can no more be restricted to inside the firewall usage. Though consumerization of IT has

boosted employee productivity and flexibility but IT still has the responsibility to protect organizational intellectual property and is

struggling with bring your own device (BYOD) programs and mobile data management. The mobility management framework helps

business to determine current stage of enterprise mobility management, set and accomplish goals, and build roadmap to advance.

Page 15: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xiii Advaiya Solutions Pvt. Ltd.

References

Enterasys Mobile IAM

http://www.enterasys.com/products/advanced-security-apps/enterasys-network-access.aspx

http://onefabric.net/byod/ETS_Mobile_IAM-Tracking_Users_and_Devices.pdf

MaaS360 Mobile Device Management

http://www.maas360.com/products/mobile-device-management/

http://content.maas360.com/www/content/ds/ds_maas360_mdm_overview.pdf

AirWatch’s Mobile Device Management

http://www.air-watch.com/solutions/mobile-device-management

AirWatch's Mobile Security Solution

http://www.air-watch.com/solutions/mobile-security

Boxtone

http://boxtone.com/mobile-device-management.aspx

ProMDM

http://www.promdm.com/product-overview/

Absolute Manage for Mobile Device

http://www.absolute.com/products/absolute-manage-mdm

SMS Global

http://www.smsglobal.com/in/en/sms/apis.php

http://www.smsglobal.com/in/en/sms/bulk_sms.php

http://www.smsglobal.com/in/en/sms/2-way_sms.php

SMS Matrix

http://www.smsmatrix.com/?sms-messaging

ZNI

http://www.znisms.com/index.html

Easy SMS: Communicator 2

http://www.clickatell.com/get-creative-with-sms/

Enterprise Direct SMS

http://www.maxis.com.my/business/lmc/data/eds.asp

Mozeo Text Messaging

http://www.mozeo.com/text-messaging-services-features.php

Symantec App Center

Page 16: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xiv Advaiya Solutions Pvt. Ltd.

http://www.symantec.com/app-center-enterprise-edition

NetScaler Access Gateway

http://www.citrix.com/products/netscaler-access-gateway/overview.html

WSO2 Cloud Gateway

http://wso2.com/products/cloud-gateway/

Roverapp

http://roverapps.com/secure-browser

e-Zest Enterprise Application Integration

http://www.e-zest.net/it-services/custom-it-development/eai/

iWay Application System Adapters

http://www.informationbuilders.com/products/applicationsystemadapters

http://www.informationbuilders.com/products/pdf/iWaySysAdapters.pdf

Enterprise Application Integration

http://www.snaplogic.com/what-we-do/solutions/enterprise-application-integration.php

http://www.snaplogic.com/resources/white-paper/future-proof-your-cloud-integration.pdf

MuleSoft Connectors

http://www.mulesoft.com/cloud-connectors-full

EDI Application Integrator

http://www.gecti.com/gxs.html

Jitterbit Application Integration Solutions

http://www.jitterbit.com/Solutions/application-integration

Page 17: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xv Advaiya Solutions Pvt. Ltd.

Glossary

Term Long form/ Expansion Definition

BYOD Bring Your Own Device Bring your own device (BYOD) (also called bring your own technology (BYOT), bring

your own phone (BYOP), and bring your own PC (BYOPC/BYOC)) means the policy of

permitting employees to bring personally owned mobile devices (laptops, tablets, and

smart phones) to their workplace, and use those devices to access privileged company

information and applications AD Active Directory It is the software system that stores, organizes and provides access to information in a

directory. In software engineering, a directory is a map between names and values. It

allows the lookup of values given a name, similar to a dictionary

LDAP Lightweight Directory Access

Protocol It is an application protocol for accessing and maintaining distributed directory

information services over an Internet Protocol (IP) network.

OTP One-time password A one-time password (OTP) is a password that is valid for only one login session or

transaction SMS Short Message Service (SMS) Short Message Service (SMS) is a text messaging service component of phone, web, or

mobile communication systems, using standardized communications protocols that

allow the exchange of short text messages between fixed line or mobile phone devices

VOIP Voice Over Internet Protocol It commonly refers to the communication protocols, technologies, methodologies, and

transmission techniques involved in the delivery of voice communications and

multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

Rooting It is the process of allowing users of smartphones, tablets, and other devices running

the mobile operating system to attain privileged control (known as "root access")

within subsystem. Jailbreak

detection Jailbreaking is the process of removing the limitations on mobile devices through the

use of software and hardware exploits. Jailbreaking permits root access to the

operating system, allowing the download of additional applications, extensions, and

themes that are unavailable through the official App Store.

Encryption Encryption is the process of encoding messages (or information) in such a way that

eavesdroppers or hackers cannot read it, but that authorized parties can

Single sign-

on Single sign-on (SSO) is a property of access control of multiple related, but

independent software systems. With this property a user logs in once and gains access

to all systems without being prompted to log in again at each of them.

Conversely, Single sign-off is the property whereby a single action of signing out

terminates access to multiple software systems.

App

blacklisting/

Whitelisting

Application Whitelisting is a proactive security method where only approved

programs are allowed to run and blocking rest of the programs from running by

default.

On the contrary, Application Blacklisting blocks certain programs while allowing rest to

run by default. SD Secure Digital Secure Digital or (SD) is a non-volatile memory card format for use in portable devices,

such as mobile phones, digital cameras, GPS navigation devices, and tablet computers.

Sandbox Sandbox (computer security), a virtual container in which untrusted programs can be

safely run.

Sandbox (software development), an online environment in which code or content

changes can be tested without affecting the original system DLP Data Leakage Prevention Data loss/leak prevention solution is a system that is designed to detect potential data

breach / data ex-filtration transmissions and prevent them by monitoring, detecting &

blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and

Page 18: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xvi Advaiya Solutions Pvt. Ltd.

at-rest (data storage)

OTA Over-the-Air A general term for wireless programming of devices such as mobile phones and set-

top boxes SAML Security Assertion Markup

Language It is an XML-based open standard data format for exchanging authentication and

authorization data between parties, in particular, between an identity provider and a

service provider. SCEP Simple Certificate Enrollment

Protocol Simple Certificate Enrollment Protocol is an Internet Draft in the Internet Engineering

Task Force (IETF). This protocol is being referenced by several manufacturers of

network equipment and software who are developing simplified means of handling

certificates for large-scale implementation to everyday users.

Quarantine Isolation of unfit devices to ensure data and application security

API Application Programming

Interface An application programming interface (API) is a protocol intended to be used as an

interface by software components to communicate with each other. An API is a library

that may include specification for routines, data structures, object classes, and

variables. CRM Customer Relationship

Management Customer relationship management (CRM) is a model for managing a company’s

interactions with current and future customers. It provides a 360 degree view of

customer data. [citation needed] It involves using technology to organize, automate,

and synchronize sales, marketing, customer service, and technical support.

ERP Enterprise Resource Planning Enterprise resource planning (ERP) systems integrate internal and external

management information across an entire organization—embracing

finance/accounting, manufacturing, sales and service, customer relationship

management, etc. ERP systems automate this activity with an integrated software

application. The purpose of ERP is to facilitate the flow of information between all

business functions inside the boundaries of the organization and manage the

connections to outside stakeholders.

WAP Wireless Application Protocol Wireless Application Protocol (WAP) is a technical standard for accessing information

over a mobile wireless network. A WAP browser is a web browser for mobile devices

such as mobile phones that uses the protocol.

VCard vCard is a file format standard for electronic business cards

VPN Virtual Private Network A virtual private network (VPN) extends a private network and the resources contained

in the network across public networks like the Internet. It enables a host computer to

send and receive data across shared or public networks as if it were a private network

with all the functionality, security and management policies of the private network

SOA Services oriented Architecture Service-oriented architecture (SOA) is a set of principles and methodologies for

designing and developing software in the form of interoperable services. These services

have well-defined business functionalities that are built as software components

(discrete pieces of code and/or data structures) which can be reused for different

purposes ORB Object Request Broker Object request broker (ORB) is a piece of middleware software that allows

programmers to make program calls from one computer to another via a network (so-

called remote procedure calls). ORBs promote interoperability of distributed object

systems because they enable users to build systems by piecing together objects from

different vendors, so that they communicate with each other via the ORB.

Page 19: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xvii Advaiya Solutions Pvt. Ltd.

RPC Remote Procedure Call Remote procedure call (RPC) is an inter-process communication that allows a computer

program to cause a subroutine or procedure to execute in another address space

(commonly on another computer on a shared network) without the programmer

explicitly coding the details for this remote interaction.

SaaS Software as a Service Software as a service, sometimes referred to as "on-demand software", is a software

delivery model in which software and associated data are centrally hosted on the

cloud. SaaS is typically accessed by users using a thin client via a web browser.

EDI Electronic data interchange It is a method for transferring data between different computer systems or computer

networks. It is commonly used by big companies for e-commerce purposes, such as

sending orders to warehouses or tracking their order.

ESB Enterprise Service Bus An enterprise service bus (ESB) is a software architecture model used for designing and

implementing the interaction and communication between mutually interacting

software applications in service-oriented architecture (SOA). As a software architecture

model for distributed computing it is a specialty variant of the more general client

server software architecture model and promotes agility and flexibility with regards to

communication and interaction between applications.

Page 20: Advaiya enterprise mobility whitepaper

Enterprise Mobility

Page xviii Advaiya Solutions Pvt. Ltd.

Contact Us

Advaiya Solutions Pvt. Ltd.

G14-17, IT Park, Madri Industrial Area, Udaipur 313002 India

Phone:+91 294 305 1100 | Fax:+91 294 305 1300

[email protected]

Advaiya, Inc. (Washington)

2475 140th Ave NE, Suite 201, Bellevue, WA 98005 USA

Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201

Advaiya, Inc. (Silicon Valley)

440 North Wolfe Road, Sunnyvale, CA 94085, Silicon Valley

Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201