SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Copyright Sencha Inc. 2014
Sencha Space
MIRAE WEB Inc. Developer Conference

May 16 2014
SENCHA | Contents
• Technology Trends
• Challenges with Enterprise Mobility
• Sencha Space
• Introduction to Space
• Benefits and Capabilities
• Packaging
• Space in the Enterprise Mobility Management Landscape
• Q & A
SENCHA |
Consumerisation of IT
• Personal devices becoming pervasive in the enterprise
• Organisations must address challenges around BYOD
• Opportunity for productivity gains and cost savings
Rapid Adoption of Mobile
• Mobile device sales surpass PC sales
• Mobility comes with heightened security risks
• Driving a shift to mobile-first development
Enterprise Cloud Goes
Mainstream
• Cloud services gain acceptance for use in production
• Cloud providers adapt offerings for the enterprise
• Cloud IT investment poised for explosive growth
Accelerating workforce
virtualisation
• Collaboration with non-employees is the new normal
• Managing access and data security is a major challenge
• Organisational boundaries increasingly dynamic
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Personal devices becoming pervasive
in the enterprise
• Organisations must address
challenges around BYOD
• Opportunity for productivity gains
and cost savings
Consumerisation of IT
Source: IDC Survey: US Mobile Security Survey, April, 2013
2013: Enterprises move towards BYOD
IT Controlled

(no BYOD)
BYOD Allowed
0% 18% 35% 53% 70%
Enterprise Mobility Policy
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Mobile device sales surpass 

PC sales
• Driving a shift to mobile-first application
development
• Mobility comes with heightened security
risks
• Mobile app development incurs new costs
related to multi-platform development
and testing, app store distribution
Rapid Adoption of Mobile
• Source: http://www.gartner.com/newsroom/id/2610015, October, 2013
• http://www.smartplanet.com/blog/bulletin/outsourcing-to-surge-in-2013-study/
Forecast: PC vs. Mobile Sales
DeviceShipments(ThousandsofUnits)
0
750,000
1,500,000
2,250,000
3,000,000
2012 2013 2014
2,168,259
1,994,7351,866,380
321,464321,698351,060
PC
Smart Mobile Devices
CAGR:+7.7%
CAGR:-4.3%
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
• Cloud services gain acceptance for
use in production
• Cloud providers adapt offerings for
the enterprise
• Cloud IT investment poised for
explosive growth
Enterprise Cloud Goes
Mainstream
35% increase in production
VMs between 2012-20131
69% of organisations expect
growth in cloud spending
from 2013 to 20142
• Source: Verizon, State of the Enterprise Cloud, 2013
• Source: 451Research, “Enterprise Cloud Computing Poised for Explosive
Growth During Next Two Years,” September 2013
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
Telework grew by 79.7%
between 2005 and 2012,
expected to grow another
21% by 20161
80-85% of enterprises in a
recent survey plan to
increase workforce
outsourcing2
• Collaboration with remote colleagues
and non-employees is the new
normal
• Managing access and data security is
a major challenge
• Organisational boundaries
increasingly dynamic
Accelerating workforce virtualisation
1. http://www.globalworkplaceanalytics.com/telecommuting-statistics, September, 2013
2. Source: “2013 State of Outsourcing”, HfS Research Ltd. and KPMG Shared Services and
Outsourcing Advisory, p. 5
Technology Trends

Shaping the Evolution of Enterprise Mobility
SENCHA |
Mobility can make it more difficult to…
Enforce business policies consistently
Secure data moving across untrusted 

networks and devices
Manage user, data, application life cycles
Challenges

Mobility and BYOD increase risk
SENCHA |
The cost of mobility can erode its ROI
Write Code Test Publish to app
market
Deploy Update
$ $ $ $ $Each part of the app
development process incurs
expenses…
Write Code Test
Publish to
AppStore
Deploy Update
$ $ $ $ $
Write Code Test Publish to app
market
Deploy Update
$ $ $ $ $…which multiply with each
new supported mobile OS/
device platform
Management SecurityAnd these processes and apps need to
be managed and secure to limit risk
Challenges

Enterprise mobility can be expensive
SENCHA |
The security landscape has raised the stakes
✓ Targeted attacks
✓ Spear phishing and social engineering
✓ Mobile malware
✓ Advanced Persistent Threats
✓ Rising cost of data breaches
How do you manage the tradeoffs between
✓ Operational flexibility
✓ Security
✓ Cost and complexity
$
Challenges

Security is increasingly challenging
SENCHA |
1. Management Console
2. Mobile Client Application
What is Space?
1 2
Sencha Space

Introduction to Space
SENCHA |
• Provides centralised management of the user, data,
and application life cycles
• Allows administrators to enforce policy consistently
• Set minimum PIN length
• Specify group membership
• Provision apps to groups
• Configure advanced user authentication
• Enable SSL VPN connectivity
• Facilitates reporting and auditing with detailed usage
analytics
Management Console
Sencha Space

Management Console Overview
Space Management
Centralised Admin Console
Policy Engine
Identity and
Access
App Delivery
Data Security Network Security
SENCHA |
• Supports iOS and Android (Win Phone 8 and Blackberry
in beta)
• Segregates business and personal data
• Secures business data with strong encryption and
digital signatures
• Enforces policies downloaded from the console
• Facilitates secure, managed use of HTML5 apps
• Provides developer API to OS/Device features for rich,
modern, mobile user experience
Mobile Client Application
Sencha Space

Mobile Client Application
SENCHA |
Component Capabilities Benefits
Security
• Secure data in-motion and at-rest
• Manage user access entitlements
• Manage risk
• Facilitate compliance
Policy Engine
• Set and enforce consistent usage and
security policies
• Deploy applications instantly
• Block users/devices instantly
• Improve operational
efficiency
• Manage mobility risk
Analytics
• Monitor activity at the user and device
level
• Track application activity
• Facilitate audit and
reporting
• Enhance operational
visibility
Developer API
• Provide consistent API access to native
device/OS capabilities
• Provide developer access to Space
platform capabilities
• Help reduce the cost of
cross-platform
development
Sencha Space

Overview of Capabilities and Benefits
SENCHA |
• Reduce the risk of data breach
• Grant access to applications and data
based only on business need
• Deploy applications securely to
anyone on any device
Key Benefits
• Data Encryption – All data is stored encrypted in Space
to protect the confidentiality of sensitive, proprietary
information
• Network Security – All data transmitted between the
Space client app and management server is SSL-
encrypted
• VPN Support – Integration with Cisco and Juniper
clientless SSL VPN for secure connectivity between the
Space client app and back-end data centre assets
• Authentication – Single sign-on support using widely
accepted SAML open standard
Security
Sencha Space

Security
SENCHA |
• Simplify mobility management
• Grant/deny access to applications
and data based on business need
• Deploy applications securely to
anyone on any device
Key Benefits
• Centralised view of all users and group membership
• Inventory of mobile devices
• Revoke user access instantly
• Revoke access from individual devices instantly
• Remotely wipe your organisation’s data from a Space
client
• Provision apps to groups or users instantly
Device / User / App
Management
Sencha Space

Policy Engine
SENCHA |
• Improve situational awareness
• Reduce the complexity of audit and
compliance
Key Benefits
• Monitor activity usage – Monitor
and track the usage of applications,
as well as user and device activity
• Reporting – Easily generate useful
reports that will simplify audit and
compliance efforts
Analytics / Reporting
Sencha Space

Analytics
SENCHA |
• Eliminate or reduce costly
development processes
• Enable true cross-platform
development
• Maintain a modern, mobile user
experience without the
complications of native and hybrid
mobile development
Key Benefits
• Cross-platform API
• Allows developers to access mobile
OS/device capabilities in their
HTML5 apps
• Supported APIs
Developer API
✓Secure file system
✓Secure SQL DB
✓Camera
✓GPS
✓Orientation
✓Invocation
Sencha Space

Developer API
Copyright Sencha Inc. 2014
Questions & Answers
!
Demo
질문과 답변
Copyright Sencha Inc. 2014
Thank you
감사합니다
Jeff Pope
Managing Director Asia & Pacific | Sencha Inc.

Más contenido relacionado

La actualidad más candente

Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesSolarWinds
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?Ahmed Banafa
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSolarWinds
 
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Inductive Automation
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Itential
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamMobileWorxs
 
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsSolarWinds
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsSBWebinars
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 

La actualidad más candente (20)

Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New Features
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your Logs
 
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
Integrator Evolution: Discussing Current Challenges & Future Trends in Indust...
 
Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...Revealing the State of Network Configuration Management & Automation in the E...
Revealing the State of Network Configuration Management & Automation in the E...
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutaminePrimend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
Primend Pilveseminar - Office 365 uuendused, kasud ja juurutamine
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal Standards
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP CloudsHow to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 

Destacado

[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5미래웹기술연구소 (MIRAE WEB)
 
Towards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsTowards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsHeiko Koziolek
 
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss GimSTONE BRAND COMMUNICATIONS
 
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진Jwajin Yoon
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개미래웹기술연구소 (MIRAE WEB)
 
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향미래웹기술연구소 (MIRAE WEB)
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대미래웹기술연구소 (MIRAE WEB)
 
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?미래웹기술연구소 (MIRAE WEB)
 
HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안욱래 김
 
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례미래웹기술연구소 (MIRAE WEB)
 
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
실무자를 위한  ExtJS  엔터프라이즈 개발 노하우실무자를 위한  ExtJS  엔터프라이즈 개발 노하우
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우미래웹기술연구소 (MIRAE WEB)
 
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례미래웹기술연구소 (MIRAE WEB)
 
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션미래웹기술연구소 (MIRAE WEB)
 
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS미래웹기술연구소 (MIRAE WEB)
 

Destacado (20)

[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
[Sencha 엔터프라이즈 웹애플리케이션 세미나] Enterprise Level Web Application w_ Ext JS 5
 
Towards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software ApplicationsTowards an Architectural Style for Multi-tenant Software Applications
Towards an Architectural Style for Multi-tenant Software Applications
 
Mobile UI Framework
Mobile UI FrameworkMobile UI Framework
Mobile UI Framework
 
HTML5 와 미래웹기술 part 1
HTML5 와 미래웹기술 part 1HTML5 와 미래웹기술 part 1
HTML5 와 미래웹기술 part 1
 
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
[STONE BID] 무엇이 오스카를 특별하게 만드는가 by Kriss Gim
 
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
한국형웹콘텐츠접근성지침2 0 알아보기_윤좌진
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 기업 환경에서 HTML5 도입전략 소개
 
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
차세대 모바일 App 기술동향 컨퍼런스 - HTML5와 웹앱 동향
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
[Sencha 엔터프라이즈 웹애플리케이션 세미나] 웹앱기반 차세대 학사 관리시스템 _청강문화산업대
 
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
Sencha 가 기업용 WebApps 를 위한 최적의 솔루션인 이유는?
 
HTML5 기업 적용시 고려사항 : 미래웹기술연구소
HTML5 기업 적용시 고려사항 : 미래웹기술연구소 HTML5 기업 적용시 고려사항 : 미래웹기술연구소
HTML5 기업 적용시 고려사항 : 미래웹기술연구소
 
Sencha ExtJS를 활용한 Big Data Platform 개발 사례
Sencha ExtJS를 활용한 Big Data Platform 개발 사례 Sencha ExtJS를 활용한 Big Data Platform 개발 사례
Sencha ExtJS를 활용한 Big Data Platform 개발 사례
 
HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안HTML5 플랫폼 동향과 기업업무 적용 방안
HTML5 플랫폼 동향과 기업업무 적용 방안
 
HTML5 와 미래웹기술 part 3
HTML5 와 미래웹기술 part 3HTML5 와 미래웹기술 part 3
HTML5 와 미래웹기술 part 3
 
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
Sencha ExtJS 5 와 Sencha Architect 3 를 활용한 엔터프라이즈 솔루션 개발사례
 
HTML5 와 미래웹기술 part 2
HTML5 와 미래웹기술 part 2HTML5 와 미래웹기술 part 2
HTML5 와 미래웹기술 part 2
 
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
실무자를 위한  ExtJS  엔터프라이즈 개발 노하우실무자를 위한  ExtJS  엔터프라이즈 개발 노하우
실무자를 위한 ExtJS 엔터프라이즈 개발 노하우
 
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
Sencha ExtJS를 활용한 물류 통합 관리솔루션 개발 사례
 
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
Kaazing - 웹소켓 기술의 유일한 엔터프라이즈 솔루션
 
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
엔터프라이즈 웹애플리케이션 개발 솔루션 Sencha ExtJS
 

Similar a [Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hostingtechzimslides
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestAvere Systems
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 

Similar a [Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
CipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access GatewayCipherGraph Networks: Cloud Access Gateway
CipherGraph Networks: Cloud Access Gateway
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Shift to Application & Infrastructure Hosting
Shift to Application & Infrastructure HostingShift to Application & Infrastructure Hosting
Shift to Application & Infrastructure Hosting
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 

Más de 미래웹기술연구소 (MIRAE WEB)

[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트미래웹기술연구소 (MIRAE WEB)
 
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석미래웹기술연구소 (MIRAE WEB)
 

Más de 미래웹기술연구소 (MIRAE WEB) (14)

미래웹기술연구소는 왜 Sencha 를 채택하였는가?
미래웹기술연구소는 왜 Sencha 를 채택하였는가?미래웹기술연구소는 왜 Sencha 를 채택하였는가?
미래웹기술연구소는 왜 Sencha 를 채택하였는가?
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
[Sencha 엔터프라이즈 웹애플리케이션 세미나] MVC 아키텍트를 적용한 모니터링 관제시스템 구축 _인젠트
 
Ext JS 구축사례 : 하나로 TNS
Ext JS 구축사례 : 하나로 TNSExt JS 구축사례 : 하나로 TNS
Ext JS 구축사례 : 하나로 TNS
 
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
[Sencha 국제공인 교육_Ext JS 4 Training ] 5월교육
 
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
Sencha Ext JS 구축사례 : 콜로사 프로세스메이커
 
Sencha Ext JS 구축사례 : 마케토
Sencha Ext JS 구축사례 : 마케토Sencha Ext JS 구축사례 : 마케토
Sencha Ext JS 구축사례 : 마케토
 
Sencha Ext JS 구축사례 : 코드스미스 툴즈
Sencha Ext JS 구축사례 : 코드스미스 툴즈Sencha Ext JS 구축사례 : 코드스미스 툴즈
Sencha Ext JS 구축사례 : 코드스미스 툴즈
 
Sencha Touch 구축사례 : 포드 쇼룸 앱
Sencha Touch 구축사례 : 포드 쇼룸 앱Sencha Touch 구축사례 : 포드 쇼룸 앱
Sencha Touch 구축사례 : 포드 쇼룸 앱
 
Sencha Ext JS 구축사례 : 클릭타임
Sencha Ext JS 구축사례 : 클릭타임Sencha Ext JS 구축사례 : 클릭타임
Sencha Ext JS 구축사례 : 클릭타임
 
Sencha Touch 구축사례 : 스텔라앤닷
Sencha Touch 구축사례 : 스텔라앤닷Sencha Touch 구축사례 : 스텔라앤닷
Sencha Touch 구축사례 : 스텔라앤닷
 
양면브로셔0324
양면브로셔0324양면브로셔0324
양면브로셔0324
 
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
Sencha Touch 구축사례 : SK 모바일 아카데미 사례분석
 
W3C 온라인 트레이닝 한국어과정
W3C 온라인 트레이닝 한국어과정W3C 온라인 트레이닝 한국어과정
W3C 온라인 트레이닝 한국어과정
 
N-Screen 종결자, HTML5
N-Screen 종결자, HTML5N-Screen 종결자, HTML5
N-Screen 종결자, HTML5
 

Último

CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Último (20)

Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space

  • 1. Copyright Sencha Inc. 2014 Sencha Space MIRAE WEB Inc. Developer Conference
 May 16 2014
  • 2. SENCHA | Contents • Technology Trends • Challenges with Enterprise Mobility • Sencha Space • Introduction to Space • Benefits and Capabilities • Packaging • Space in the Enterprise Mobility Management Landscape • Q & A
  • 3. SENCHA | Consumerisation of IT • Personal devices becoming pervasive in the enterprise • Organisations must address challenges around BYOD • Opportunity for productivity gains and cost savings Rapid Adoption of Mobile • Mobile device sales surpass PC sales • Mobility comes with heightened security risks • Driving a shift to mobile-first development Enterprise Cloud Goes Mainstream • Cloud services gain acceptance for use in production • Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth Accelerating workforce virtualisation • Collaboration with non-employees is the new normal • Managing access and data security is a major challenge • Organisational boundaries increasingly dynamic Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 4. SENCHA | • Personal devices becoming pervasive in the enterprise • Organisations must address challenges around BYOD • Opportunity for productivity gains and cost savings Consumerisation of IT Source: IDC Survey: US Mobile Security Survey, April, 2013 2013: Enterprises move towards BYOD IT Controlled
 (no BYOD) BYOD Allowed 0% 18% 35% 53% 70% Enterprise Mobility Policy Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 5. SENCHA | • Mobile device sales surpass 
 PC sales • Driving a shift to mobile-first application development • Mobility comes with heightened security risks • Mobile app development incurs new costs related to multi-platform development and testing, app store distribution Rapid Adoption of Mobile • Source: http://www.gartner.com/newsroom/id/2610015, October, 2013 • http://www.smartplanet.com/blog/bulletin/outsourcing-to-surge-in-2013-study/ Forecast: PC vs. Mobile Sales DeviceShipments(ThousandsofUnits) 0 750,000 1,500,000 2,250,000 3,000,000 2012 2013 2014 2,168,259 1,994,7351,866,380 321,464321,698351,060 PC Smart Mobile Devices CAGR:+7.7% CAGR:-4.3% Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 6. SENCHA | • Cloud services gain acceptance for use in production • Cloud providers adapt offerings for the enterprise • Cloud IT investment poised for explosive growth Enterprise Cloud Goes Mainstream 35% increase in production VMs between 2012-20131 69% of organisations expect growth in cloud spending from 2013 to 20142 • Source: Verizon, State of the Enterprise Cloud, 2013 • Source: 451Research, “Enterprise Cloud Computing Poised for Explosive Growth During Next Two Years,” September 2013 Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 7. SENCHA | Telework grew by 79.7% between 2005 and 2012, expected to grow another 21% by 20161 80-85% of enterprises in a recent survey plan to increase workforce outsourcing2 • Collaboration with remote colleagues and non-employees is the new normal • Managing access and data security is a major challenge • Organisational boundaries increasingly dynamic Accelerating workforce virtualisation 1. http://www.globalworkplaceanalytics.com/telecommuting-statistics, September, 2013 2. Source: “2013 State of Outsourcing”, HfS Research Ltd. and KPMG Shared Services and Outsourcing Advisory, p. 5 Technology Trends
 Shaping the Evolution of Enterprise Mobility
  • 8. SENCHA | Mobility can make it more difficult to… Enforce business policies consistently Secure data moving across untrusted 
 networks and devices Manage user, data, application life cycles Challenges
 Mobility and BYOD increase risk
  • 9. SENCHA | The cost of mobility can erode its ROI Write Code Test Publish to app market Deploy Update $ $ $ $ $Each part of the app development process incurs expenses… Write Code Test Publish to AppStore Deploy Update $ $ $ $ $ Write Code Test Publish to app market Deploy Update $ $ $ $ $…which multiply with each new supported mobile OS/ device platform Management SecurityAnd these processes and apps need to be managed and secure to limit risk Challenges
 Enterprise mobility can be expensive
  • 10. SENCHA | The security landscape has raised the stakes ✓ Targeted attacks ✓ Spear phishing and social engineering ✓ Mobile malware ✓ Advanced Persistent Threats ✓ Rising cost of data breaches How do you manage the tradeoffs between ✓ Operational flexibility ✓ Security ✓ Cost and complexity $ Challenges
 Security is increasingly challenging
  • 11. SENCHA | 1. Management Console 2. Mobile Client Application What is Space? 1 2 Sencha Space
 Introduction to Space
  • 12. SENCHA | • Provides centralised management of the user, data, and application life cycles • Allows administrators to enforce policy consistently • Set minimum PIN length • Specify group membership • Provision apps to groups • Configure advanced user authentication • Enable SSL VPN connectivity • Facilitates reporting and auditing with detailed usage analytics Management Console Sencha Space
 Management Console Overview Space Management Centralised Admin Console Policy Engine Identity and Access App Delivery Data Security Network Security
  • 13. SENCHA | • Supports iOS and Android (Win Phone 8 and Blackberry in beta) • Segregates business and personal data • Secures business data with strong encryption and digital signatures • Enforces policies downloaded from the console • Facilitates secure, managed use of HTML5 apps • Provides developer API to OS/Device features for rich, modern, mobile user experience Mobile Client Application Sencha Space
 Mobile Client Application
  • 14. SENCHA | Component Capabilities Benefits Security • Secure data in-motion and at-rest • Manage user access entitlements • Manage risk • Facilitate compliance Policy Engine • Set and enforce consistent usage and security policies • Deploy applications instantly • Block users/devices instantly • Improve operational efficiency • Manage mobility risk Analytics • Monitor activity at the user and device level • Track application activity • Facilitate audit and reporting • Enhance operational visibility Developer API • Provide consistent API access to native device/OS capabilities • Provide developer access to Space platform capabilities • Help reduce the cost of cross-platform development Sencha Space
 Overview of Capabilities and Benefits
  • 15. SENCHA | • Reduce the risk of data breach • Grant access to applications and data based only on business need • Deploy applications securely to anyone on any device Key Benefits • Data Encryption – All data is stored encrypted in Space to protect the confidentiality of sensitive, proprietary information • Network Security – All data transmitted between the Space client app and management server is SSL- encrypted • VPN Support – Integration with Cisco and Juniper clientless SSL VPN for secure connectivity between the Space client app and back-end data centre assets • Authentication – Single sign-on support using widely accepted SAML open standard Security Sencha Space
 Security
  • 16. SENCHA | • Simplify mobility management • Grant/deny access to applications and data based on business need • Deploy applications securely to anyone on any device Key Benefits • Centralised view of all users and group membership • Inventory of mobile devices • Revoke user access instantly • Revoke access from individual devices instantly • Remotely wipe your organisation’s data from a Space client • Provision apps to groups or users instantly Device / User / App Management Sencha Space
 Policy Engine
  • 17. SENCHA | • Improve situational awareness • Reduce the complexity of audit and compliance Key Benefits • Monitor activity usage – Monitor and track the usage of applications, as well as user and device activity • Reporting – Easily generate useful reports that will simplify audit and compliance efforts Analytics / Reporting Sencha Space
 Analytics
  • 18. SENCHA | • Eliminate or reduce costly development processes • Enable true cross-platform development • Maintain a modern, mobile user experience without the complications of native and hybrid mobile development Key Benefits • Cross-platform API • Allows developers to access mobile OS/device capabilities in their HTML5 apps • Supported APIs Developer API ✓Secure file system ✓Secure SQL DB ✓Camera ✓GPS ✓Orientation ✓Invocation Sencha Space
 Developer API
  • 19. Copyright Sencha Inc. 2014 Questions & Answers ! Demo 질문과 답변
  • 20. Copyright Sencha Inc. 2014 Thank you 감사합니다 Jeff Pope Managing Director Asia & Pacific | Sencha Inc.