Three Keys to Building a Secure Mobile Infrastructure in Government Environments

23
© 2014 VMware Inc. All rights reserved. Three Keys to Building a Secure Mobile Infrastructure in Government Environments Ben Goodman Lead Evangelist, End User Computing
  • date post

    14-Sep-2014
  • Category

    Technology

  • view

    248
  • download

    0

description

Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information. This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from. Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.

Transcript of Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Page 1: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

© 2014 VMware Inc. All rights reserved.

Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Ben GoodmanLead Evangelist,End User Computing

Page 2: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

IT’s Objective for End User Computing Infrastructure

Deliver the right business apps and data touser devices in a way that is efficient and secure for IT and productive for the end user

Page 3: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

The Landscape…The world is changing rapidly.

Page 4: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

The Requirements We Used to Have…

Change is hard andhighly managed

Software implementedfrom the center out

Difficult to adjust tousers needs

Control Through OwnershipPeople you employ

Using a network youown to connect to…

Using software you own on a Windows desktop you own

An application you own, running on a server you own

Page 5: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

What the World Wants Now…

Control & Governance is Becoming More Challenging

Inability to track, control orsecure information assets

Can not remove accessyou didn’t grant

Serious compliance concerns

Apps live in manyclouds and are easily procured without IT

Always connected, via3G, 4G and public or personal wifi

Non-owned devices and multiple non-Windows OSs

Employees, contractors outsourcers, partners citizens, students

Page 6: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

IT Management Processes are Not Optimized For Change

Ownership

Devices

Connection

Apps

PAST

90%Windows Apps2

Ethernet

ITOwned

1Desktop

TODAY

50%Non-Windows Apps2

3G/4G

33%Industry average BYOD adoption1

10%of Enterprises are completely mobile and laptop4

FUTURE

4:1Ratio of Mobile apps to Windows Apps3

Public/Always On

60%of Enterprises will be completely mobile and laptop4

85%of Enterprises with BYOD programs1

STAGE IT IS OPTIMIZED FOR

All citations are from Gartner, Inc. and are used with permission

Page 7: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Rate of Change is Accelerating

No DowntimeWorkspaceNew Access Points

On-Demand ServicesApplication ChoiceData, Data and more Data

Page 8: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Explosive Growth of Mobile

Mobile worker population will reach

1.3 Billion in 2015Source: IDC Worldwide Mobile Worker Population 2011-2015 Forecast

Tablets are forecasted to reach 665 Million in 2016Source: Gartner Forecast: Media Tablets by Operating System, Worldwide 2010-2016, 1Q12 Update

Smartphones forecasted to reach 1.279 Billion in 2016Source: Gartner Forecast: Mobile Devices by Operating System, Worldwide, 2009-2016, 1Q12 Update

67% of people reported they are using their personal device at

work

Page 9: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

IT Has to Manage a Much More Diverse End-User Landscape

Personal DevicesCorporate Devices

Diverse Apps

Diverse Platform

Data Everywhere

Diverse Devices

Mobile

Page 10: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

There are Two Reasons to Invest

Sources: IDC, Forrester

REDUCE RISK AND COST GAIN AN EDGE

COSTToo many apps,too many devicesDiversity = Complexity = Cost

PRODUCTIVITYMobile users are 20% more productive than non-mobile workersAccess = Increased Output

SECURITYOnly 5% of devices usemobile securityLow Adoption = Increased Risk

COLLABORATIONCommunicate with at-home workers, contractors, customers and partnersCollaboration = Performance

COMPLIANCEAre consumertechnologies compliant?Policy Violations = Increased Risk

SATISFACTIONDifferentiate and retain top talentSatisfaction = Retention

Page 11: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

How Do You Address Changing Landscape?

…and provide all your end-users with services at the speed of life?

… while leveraging your existing investments?

… with the same amount of resources?

… and with a clear path to the future?

Page 12: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

The Three Keys…What should be at the center of every mobility program?

Page 13: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Don’t Get Stuck with Limiting Approaches

Secure mobile computing requires a long-term strategy for managing and enabling a mobile environment. Consequently, agencies should avoid these limiting responses to BYOD and other mobile trends:

Buy a Point Solution Does not scale, increases costCreates a management mess

Lock It Down Unhappy workforceIT is viewed the “bad guy”

Ignore It Poor IT ControlSecurity and compliance risk

Page 14: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Manage Data and Applications• Virtualization and cloud technologies now make it possible for

agencies to transform their assets into centralized services that employees can access anytime, anywhere, and from any device.

• Enterprise Application catalogs give you a single place to manage applications of all types. This is even more important in a mobile, cross-platform world.

• Enterprise File Synchronization and Sharing technology and Mobile Content Management technology make it easier for users to access their data from anywhere. They can securely and easily share documents with co-workers or others they collaborate with.

Page 15: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Strengthen & Simplify Security

• Leverage strong and multi-factor authentication.

• Consider isolating the networks on which mobile devices authenticate to enhance security and ensure users only access agency data and applications if authorized.

• Ensure that you have auditing and tracking capabilities for mobile platforms equal to or greater than PC platforms.

• Ensure that devices are properly patched and limit OS versions that you support

• Consider use of VDI. With a virtual desktop infrastructure (VDI), an agency’s data and applications can be managed securely by IT staff and then brokered and delivered to users according to agency policies

Page 16: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

How to Optimize Delivery of EUC Services

Manage users, not devices

Embraceco-ownership

Architect for change and continual improvement

Prioritizeend user experience

Treat mobile as a first-class citizen

Page 17: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

How VMware Delivers…Building a Virtual Workspace

Page 18: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

End-User Computing Vision

Desktop Laptop Tablet Phone Machine

Mission: Secure Virtual Workspace for Work at Speed of Life

PCs, Laptops

Thin Clients

Tablets, Smartphones

DesktopManagementand Delivery

Multi-DeviceWorkspace

(Mobile)

Page 19: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Introducing the Virtual Workspace

One login | One experience | Any device

Page 20: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Central Point of Control

Entitlements

Access PoliciesReporting

Page 21: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

About AirWatch

• Leaders in mobile security, mobile device, application and content management across multiple platforms

• Strong leadership team, headquartered in Atlanta, ex-Manhattan Associates execs, built with no outside capital

• Provides mobility solutions to 10,000+ global customers

• Largest Enterprise Mobile Management & Security provider with 1,600+ employees, largest R&D team in category

Mission: Simplify Enterprise MobilityTM

10,000customers

150countries

16languages

1,600employees

Page 22: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

AirWatch Solution Overview

What Blackberry Enterprise Server did for Blackberry devices, AirWatch does for today’s iOS, Android, Windows and other platforms

Framework: Security, Multi-tenancy, Scalability, Privacy, Access-Control, Self-Service, Telecom Expense

Enterprise Mobility Management Platform

Mobile Device Management

Mobile Application

Management

Mobile Content

Management

Mobile EmailManagement

Page 23: Three Keys to Building a Secure Mobile Infrastructure in Government Environments

Thank You

For more information, please visit

www.vmware.com/go/GovernmentMobility