Employees are bringing their mobile devices into the workplace and increasing the demand for enterprises to provide applications that allow them to work on the go. Enterprises are also seeing the benefits of BYOD with increased productivity, reduced costs and higher job satisfaction. But how do you ensure that you're providing secure enterprise apps while maintaining ease of use? This webinar, featuring Layer 7 and Taptera, will look at how you can provide rapid and secure mobile access infrastructure, and enterprise mobile apps that are consistent with the popular consumer app experience employees are used to.
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
BYOD Enterprise Mobility: Beauty & the Beast
1. Enterprise Mobile Apps: Beauty & The Beast
BYOD, Enterprise Integration, and Beautiful Mobile Apps
Chris O’Connor, CEO & Co-founder, Taptera
Matt McLarty, VP Client Solutions, Layer 7 Technologies
2. Housekeeping
Questions
- Chat any questions you have and we’ll answer them at the end of this call
facebook.com/layer7
Twitter
- Today’s event hashtag:
- #L7webinar layer7.com/linkedin
layer7.com/blogs
- Follow us on Twitter:
- @Layer7
- @Taptera
- @MattMcLartyBC
- @NowHearChris
4. Beauty – The Mobile Enterprise
Worldwide mobile trends ...
- “By 2015, more U.S. Internet users will access the Internet through mobile devices than
through PCs or other wireline devices.”
- “By 2015, the world's mobile worker population will reach 1.3 billion, representing
37.2% of the total workforce.”
Trends driving the growth of Mobile in Enterprise IT ...
Source: IDC (September 2011, January 2012)
- Consumerization, BYOD
- Verticalization
- New devices & device categories
- Cloud-based mobile applications
- Emerging M2M technologies
“Mobility is poised to become the next major IT paradigm.
This gravitational shift will bring an array of opportunities and challenges to the
chief information officers in most enterprises.”
Source: McKinsey (June 2012)
5. Why “Beautiful” Apps Matter
- Mobile devices have become personal extensions
Better Productivity
- BYOD enables work on one’s favourite “toy”
- An appealing, usable, functional app further incents usage
Personal mobile devices—tablets, smartphones—are ubiquitous
Greater Accessibility
New form factor brings new capabilities—geo-location, presence, photo
-
Truly “always-on”
-
Speed and consumability compel usage
-
-
7. “The Beast” – The Challenges of Mobile
- Identity management
Security
- Application and data lifecycle (access → transport → storage → removal)
Deployment complexity
- New mobile apps
- Integration with existing applications and systems
- Platform fragmentation
Technology
- Pace of change
- Privacy issues
Governance
8. The Shedding of Tiers
Web Application
Presentation
Business Logic
Data Access
Relational
Database
9. The Shedding of Tiers
Mobile Devices
Presentation
Business Logic
Data Access
Big Data
10. The Shedding of Tiers
Mobile Devices
Presentation
Business Logic
Data Access
Big Data
11. The Shedding of Tiers
Mobile Devices
Presentation
Business and Data Services
Data Access
Big Data
12. The Shedding of Tiers
Presentation
Mobile Devices
Business and Data Services
Big Data
13. APIs: The New Perimeter
BYOD Presentation
Mobile Devices
API
Business and Data Services
Big Data
14. APIs: The New Perimeter
BYOD Presentation
Mobile Devices
API
Business and Data Services
Big Data
22. Layer 7 Mobile Access Gateway
A lightweight, low-latency mobile gateway for solving critical mobile challenges in the
following areas:
23. Identity: Extending Enterprise Identity to Mobile
Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
Create granular access policies at user, app and device levels
Build composite access policies combining geolocation, message content and other
network attributes
Simplify PKI-based certificate delivery and provisioning
+
24. Identity: Extending Enterprise Identity to Mobile
Map Web SSO & SAML to mobile-friendly OAuth, OpenID Connect and JSON Web Tokens
Create granular access policies at user, app and device levels
Build composite access policies combining geolocation, message content and other
network attributes
Simplify PKI-based certificate delivery and provisioning
Firewall
Mobile Devices & Apps
+
Protected
Resource
Authorization &
Resource Server
Identity Access
Management
25. Security: Mobile Application Firewalling
Protect REST, SOAP and OData APIs against DoS and API attacks
Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
Enforce FIPS 140-2 grade data privacy and integrity
Validate data exchanges, including all JSON, XML, header and parameter content
26. Security: Mobile Application Firewalling
Protect REST, SOAP and OData APIs against DoS and API attacks
Proxy API streaming protocols like HTML5 Web Sockets and XMPP messaging
Enforce FIPS 140-2 grade data privacy and integrity
Validate data exchanges, including all JSON, XML, header and parameter content
Firewall Mobile Devices & Apps
Hacker
Protect against
attacks: DOS, SQL
Injection, XSS, …
Enterprise
Resources
27. Adaptation: Translate & Orchestrate Data & APIs
Surface any legacy application or database as RESTful APIs
Quickly map between data formats such as XML and JSON
Recompose & virtualize APIs to specific mobile identities, apps and devices
Orchestrate API mashups with configurable workflow
28. Adaptation: Translate & Orchestrate Data & APIs
Surface any legacy application or database as RESTful APIs
Quickly map between data formats such as XML and JSON
Recompose & virtualize APIs to specific mobile identities, apps and devices
Orchestrate API mashups with configurable workflow
Firewall
Mobile Devices & Apps
Legacy Enterprise
Applications & Databases
29. Optimization: Handle Scale
Cache calls to backend applications
Recompose small backend calls into efficiently aggregated mobile requests
Compress traffic to minimize bandwidth costs and improve user experience
Pre-fetch content for hypermedia-based API calls
30. Optimization: Handle Scale
Cache calls to backend applications
Recompose small backend calls into efficiently aggregated mobile requests
Compress traffic to minimize bandwidth costs and improve user experience
Pre-fetch content for hypermedia-based API calls
Firewall
Mobile Devices & Apps
Enterprise
Applications
31. Integration: Centralize Cloud Connectivity
Proxy and manage app interactions with social networks
Broker call-outs to cloud services like Salesforce.com
Bridge connectivity to iPhone, Windows and Android notification services
Integrate with legacy applications using ESB capabilities
32. Integration: Centralize Cloud Connectivity
Proxy and manage app interactions with social networks
Broker call-outs to cloud services like Salesforce.com
Bridge connectivity to iPhone, Windows and Android notification services
Integrate with legacy applications using ESB capabilities
Firewall
Cloud Services
& Social Networks
On-Premise
Enterprise Applications End User
33. Summary
BYOD and Mobility are sweeping Enterprise IT
Beautiful Apps will lead to greater productivity
Taptera’s enterprise apps are fast, beautiful and secure
Simplifying mobile access to the enterprise helps to keep apps beautiful
The Layer 7 Mobile Access Gateway solves key needs:
- Identity
- Security
- Adaptation
- Optimization
- Integration