the ithings and the cloud

Post on 16-Jan-2015

357 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

The iThings And The Cloud

Consumerization of ITDr. Jeannot Muller,

VP, Head of Global Infrastructure Architecture,

DEUTSCHE POST DHL, GBS IT Services

22nd June 2011

Consumerization of IT

Securing the Enterprise Landscape

Protecting Data - Not Devices

Agenda

The Compute Continuum

Consumerization was a joke, then a threat, now obvious.

Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.

While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.

Consumerization of IT

IT needs to be prepared for the Compute Continuum:

Provide and align on requirements and priorities.

Abstract IT data and applications to function in diverse environments.

Move to cloud based service offering over time.

Establish a common development framework across devices.

Better Be Prepared

IT needs to be prepared for the Compute Continuum:

Provide and align on requirements and priorities.

Abstract IT data and applications to function in diverse environments.

Move to cloud based service offering over time.

Establish a common development framework across devices.

Better Be Prepared

SandboxSolution

Common Security Concept

Blackberry

• Only corporate container available

• Device = corporate container

• Private & corporate container available

• Sandbox = corporate container

• Deviceindependent

Corporate

Corp-orate

Private

• Security requirement: Private and corporate data must be separated (especially on private devices)

• As long as no options available to separate private and corporate data on a Blackberry: Device = corporate container

Comments

Securing The Landscape

Public available apps

Custom made apps for DPDHL

End-2-End Process

Approval process

Definition: Corporate Approved Apps

• Apps for professional aspects which are approved for installation to the smart devices’ corporate container

OrderDistri-bution

Mainte-nance

License Mgmt

5 Tier Model – Protect Your Data

Public Application

Slightly Confidential

Basic

Intermediate

Managed Equivalent In

crea

sing

acc

ess

to d

ata

with

enha

nced

sec

urity

capa

bilit

ies

THANK YOU.

Jeannot.Muller@dhl.com

top related