Three Keys to Building a Secure Mobile Infrastructure in Government Environments
-
date post
14-Sep-2014 -
Category
Technology
-
view
248 -
download
0
description
Transcript of Three Keys to Building a Secure Mobile Infrastructure in Government Environments
© 2014 VMware Inc. All rights reserved.
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Ben GoodmanLead Evangelist,End User Computing
IT’s Objective for End User Computing Infrastructure
Deliver the right business apps and data touser devices in a way that is efficient and secure for IT and productive for the end user
The Landscape…The world is changing rapidly.
The Requirements We Used to Have…
Change is hard andhighly managed
Software implementedfrom the center out
Difficult to adjust tousers needs
Control Through OwnershipPeople you employ
Using a network youown to connect to…
Using software you own on a Windows desktop you own
An application you own, running on a server you own
What the World Wants Now…
Control & Governance is Becoming More Challenging
Inability to track, control orsecure information assets
Can not remove accessyou didn’t grant
Serious compliance concerns
Apps live in manyclouds and are easily procured without IT
Always connected, via3G, 4G and public or personal wifi
Non-owned devices and multiple non-Windows OSs
Employees, contractors outsourcers, partners citizens, students
IT Management Processes are Not Optimized For Change
Ownership
Devices
Connection
Apps
PAST
90%Windows Apps2
Ethernet
ITOwned
1Desktop
TODAY
50%Non-Windows Apps2
3G/4G
33%Industry average BYOD adoption1
10%of Enterprises are completely mobile and laptop4
FUTURE
4:1Ratio of Mobile apps to Windows Apps3
Public/Always On
60%of Enterprises will be completely mobile and laptop4
85%of Enterprises with BYOD programs1
STAGE IT IS OPTIMIZED FOR
All citations are from Gartner, Inc. and are used with permission
Rate of Change is Accelerating
No DowntimeWorkspaceNew Access Points
On-Demand ServicesApplication ChoiceData, Data and more Data
Explosive Growth of Mobile
Mobile worker population will reach
1.3 Billion in 2015Source: IDC Worldwide Mobile Worker Population 2011-2015 Forecast
Tablets are forecasted to reach 665 Million in 2016Source: Gartner Forecast: Media Tablets by Operating System, Worldwide 2010-2016, 1Q12 Update
Smartphones forecasted to reach 1.279 Billion in 2016Source: Gartner Forecast: Mobile Devices by Operating System, Worldwide, 2009-2016, 1Q12 Update
67% of people reported they are using their personal device at
work
IT Has to Manage a Much More Diverse End-User Landscape
Personal DevicesCorporate Devices
Diverse Apps
Diverse Platform
Data Everywhere
Diverse Devices
Mobile
There are Two Reasons to Invest
Sources: IDC, Forrester
REDUCE RISK AND COST GAIN AN EDGE
COSTToo many apps,too many devicesDiversity = Complexity = Cost
PRODUCTIVITYMobile users are 20% more productive than non-mobile workersAccess = Increased Output
SECURITYOnly 5% of devices usemobile securityLow Adoption = Increased Risk
COLLABORATIONCommunicate with at-home workers, contractors, customers and partnersCollaboration = Performance
COMPLIANCEAre consumertechnologies compliant?Policy Violations = Increased Risk
SATISFACTIONDifferentiate and retain top talentSatisfaction = Retention
How Do You Address Changing Landscape?
…and provide all your end-users with services at the speed of life?
… while leveraging your existing investments?
… with the same amount of resources?
… and with a clear path to the future?
The Three Keys…What should be at the center of every mobility program?
Don’t Get Stuck with Limiting Approaches
Secure mobile computing requires a long-term strategy for managing and enabling a mobile environment. Consequently, agencies should avoid these limiting responses to BYOD and other mobile trends:
Buy a Point Solution Does not scale, increases costCreates a management mess
Lock It Down Unhappy workforceIT is viewed the “bad guy”
Ignore It Poor IT ControlSecurity and compliance risk
Manage Data and Applications• Virtualization and cloud technologies now make it possible for
agencies to transform their assets into centralized services that employees can access anytime, anywhere, and from any device.
• Enterprise Application catalogs give you a single place to manage applications of all types. This is even more important in a mobile, cross-platform world.
• Enterprise File Synchronization and Sharing technology and Mobile Content Management technology make it easier for users to access their data from anywhere. They can securely and easily share documents with co-workers or others they collaborate with.
Strengthen & Simplify Security
• Leverage strong and multi-factor authentication.
• Consider isolating the networks on which mobile devices authenticate to enhance security and ensure users only access agency data and applications if authorized.
• Ensure that you have auditing and tracking capabilities for mobile platforms equal to or greater than PC platforms.
• Ensure that devices are properly patched and limit OS versions that you support
• Consider use of VDI. With a virtual desktop infrastructure (VDI), an agency’s data and applications can be managed securely by IT staff and then brokered and delivered to users according to agency policies
How to Optimize Delivery of EUC Services
Manage users, not devices
Embraceco-ownership
Architect for change and continual improvement
Prioritizeend user experience
Treat mobile as a first-class citizen
How VMware Delivers…Building a Virtual Workspace
End-User Computing Vision
Desktop Laptop Tablet Phone Machine
Mission: Secure Virtual Workspace for Work at Speed of Life
PCs, Laptops
Thin Clients
Tablets, Smartphones
DesktopManagementand Delivery
Multi-DeviceWorkspace
(Mobile)
Introducing the Virtual Workspace
One login | One experience | Any device
Central Point of Control
Entitlements
Access PoliciesReporting
About AirWatch
• Leaders in mobile security, mobile device, application and content management across multiple platforms
• Strong leadership team, headquartered in Atlanta, ex-Manhattan Associates execs, built with no outside capital
• Provides mobility solutions to 10,000+ global customers
• Largest Enterprise Mobile Management & Security provider with 1,600+ employees, largest R&D team in category
Mission: Simplify Enterprise MobilityTM
10,000customers
150countries
16languages
1,600employees
AirWatch Solution Overview
What Blackberry Enterprise Server did for Blackberry devices, AirWatch does for today’s iOS, Android, Windows and other platforms
Framework: Security, Multi-tenancy, Scalability, Privacy, Access-Control, Self-Service, Telecom Expense
Enterprise Mobility Management Platform
Mobile Device Management
Mobile Application
Management
Mobile Content
Management
Mobile EmailManagement
Thank You
For more information, please visit
www.vmware.com/go/GovernmentMobility