33
Connected Device Management for Enterprise Mobility and Beyond Shan Director - Mobile Architecture

WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Embed Size (px)

Citation preview

Page 1: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Connected Device Management for Enterprise Mobility and Beyond

Shan Director - Mobile Architecture

Page 2: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Agenda

Enterprise Mobility Connected Device Management Framework Architecture WSO2 Internal Mobility Strategy

Page 3: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Enterprise Mobility

Page 4: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

SmartPhone Penetration2 billion in 2016

1/4 of global population - 2015 1/3 of global population - 2018

Page 5: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Computer

EmployeesManagers

ProductivityRisk

Owners

Customers Suppliers

Shareholders

Page 6: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Enterprise mobility

Enterprise mobility is no longer about managing executive devices’ email or providing a few enterprise business apps!

Page 7: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Enterprise

Data

EmployeesDevices

AndroidiOS Windows 8Blackberry

COPECompany Owned, Personally Enabled

BYODBring your own device

Enterprise Mobility

Tablets Laptops

IoT

Many device types

Page 8: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

PublicStore

Data

1

32

4

Enterprise Mobility Challenge

Data Security

Remote Device Management

Enterprise Store

Enterprise Application Development & Management

Resource Management

Page 9: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

How the data can be compromised ? • Device being lost or stolen • Malicious App stealing the data • Data Leak

What is the data ? • Email message or the attachment • Documents like pdf,word,excel,ppt,text • Browser accessing HTML pages,cookies • Contact,Calendar,Notes • Application with Database

Why the data is sensitive ? • It can be highly confidential like

quotation value, salary details • It can have a high impact if it goes

to the wrong person

Who can compromise ? • External • Internal

Data Security

Page 10: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Real Challenge • development of a platform which can easily plug any device • provide an interface to 3rd party application for extension

Page 11: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Enabling Device Management Support

Page 12: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

MDM Server

Agent

Android

Page 13: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Develop an Application (called as an Agent) Either use a standard protocol (OMA DM) or use your own one Security has to be handled

Page 14: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

MDM Server

Agent

APNS

iOS

Page 15: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

• No need to develop any application, if you want additional functionality (Location,Alert,Ring) • Device Management is supported in the OS layer through profiles • Depend on Apple • Need to have Enterprise Developer Account (299$/per year) • Apply for MDM vendor approval • Use Safari to download the profile • Security is handled - Certificate based • MDM push notification happens through APNS (Apple push notification service) • Apple protocol

Page 16: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

MDM ServerWNS

Windows

Page 17: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

• No need to develop any application, • Device Management is supported in the OS layer through a built-in App • Security is handled - Certificate based • Default can work with polling model • 8.1 supports push through WNS - Needs a developer account • OMA-DM

Page 18: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

EMM 1.0 EMM 2.0

Page 19: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Architecture of EMM 2.0

Page 20: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Evolution WSO2 EMM

Version 1.0 - February 2014 Version 1.1 - June 2014 Version 2.0 - November 2015

Page 21: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

User, device, policy, operation, configuration and license management. Self service enrollment for user. BYOD & COPE seperation. Identity management. API everywhere. Multi-tenancy. Dashboards. MDM platform features.

Core Features

Page 22: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

WSO2 EMM - iOS Features๏ Lock.

๏ Install/uninstall store and enterprise applications.

๏ Fetch location.

๏ Cellular.

๏ Get device information.

๏ Restrictions (nearly 70 supported).

๏ Alarm.

๏ WIFI

๏ Send Message

๏ Airplay.

๏ APN.

๏ LDAP.

๏ Email.

๏ CalDav.

๏ Calendar subscription.

๏ Passcode policy.

๏ Install web clips.

๏ Enterprise Wipe

๏ Get application list.

๏ Clear passcode.

๏ Get profile list.

๏ Remove proffiles.

๏ App lock.

๏ Get installed restrictions.

๏ VPN (L2TP, PPTP, and IPSec)

๏ Per app VPN.

Page 23: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

3

WSO2 EMM - Android Features๏Clear passcode.

๏ Enterprise WIPE.

๏Master reset.

๏Application list.

๏Ring device.

๏Mute.

๏Send messages.

๏Change lock code.

๏ Install web clips.

๏ Passcode policy.

๏ Restriction on camera.

๏ Encryption settings.

๏ WIFI.

๏ Location.

๏ Device info.

๏ Install/uninstall store and enterprise applications.

๏ Device lock.

Page 24: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

3

WSO2 EMM - Windows Features๏Passcode policy

๏Restriction on camera

๏ Encryption settings

๏Device info

๏ Lock reset

๏Device lock

๏Ring device

๏Un-enroll device

๏Data wipe

Page 25: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Enterprise App Store

Page 26: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

3

App Publisher

Page 27: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

๏ Android Enterprise Apps (APK).

๏ Android Public Apps (Apps from Google Play).

๏ iOS Enterprise Apps (IPA).

๏ iOS Public Apps (Apps From iTunes).

๏ Web Apps (Responsive mobile web apps).

Supported Mobile App Types

Page 28: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Connected Device Manager for a Connected Business

Page 29: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

WSO2 internal mobile strategy ?

Page 30: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Allow secure Wi-Fi connection to all mobile devices Secure Corporate Data Mobile Application Development Lifecycle Management

Page 31: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Framed our Policy Allow Android,iOS, Windows devices Block any rooted device or jailbroken device Allow maximum of 5 devices per device Allow BYOD and COPE devices with different policy No control to the privacy of BYOD device

Page 32: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

Testing Store

HR wants to create a HR Mobile AppProject Repository

Created

Project Manager Subscribes to APIs

IDEProduction Store

Invitation to Developer

mBaaS API, MAM API, System API

MAM

MDM

Page 33: WSO2Con USA 2015: Connected Device Management for Enterprise Mobility and Beyond

ThankYou