Download - The iThings And The Cloud
![Page 1: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/1.jpg)
The iThings And The Cloud
Consumerization of ITDr. Jeannot Muller,
VP, Head of Global Infrastructure Architecture,
DEUTSCHE POST DHL, GBS IT Services
22nd June 2011
![Page 2: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/2.jpg)
Consumerization of IT
Securing the Enterprise Landscape
Protecting Data - Not Devices
Agenda
![Page 3: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/3.jpg)
The Compute Continuum
![Page 4: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/4.jpg)
Consumerization was a joke, then a threat, now obvious.
Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.
While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.
Consumerization of IT
![Page 5: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/5.jpg)
IT needs to be prepared for the Compute Continuum:
Provide and align on requirements and priorities.
Abstract IT data and applications to function in diverse environments.
Move to cloud based service offering over time.
Establish a common development framework across devices.
Better Be Prepared
![Page 6: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/6.jpg)
IT needs to be prepared for the Compute Continuum:
Provide and align on requirements and priorities.
Abstract IT data and applications to function in diverse environments.
Move to cloud based service offering over time.
Establish a common development framework across devices.
Better Be Prepared
![Page 7: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/7.jpg)
SandboxSolution
Common Security Concept
Blackberry
• Only corporate container available
• Device = corporate container
• Private & corporate container available
• Sandbox = corporate container
• Deviceindependent
Corporate
Corp-orate
Private
• Security requirement: Private and corporate data must be separated (especially on private devices)
• As long as no options available to separate private and corporate data on a Blackberry: Device = corporate container
Comments
![Page 8: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/8.jpg)
Securing The Landscape
Public available apps
Custom made apps for DPDHL
End-2-End Process
Approval process
Definition: Corporate Approved Apps
• Apps for professional aspects which are approved for installation to the smart devices’ corporate container
OrderDistri-bution
Mainte-nance
License Mgmt
![Page 9: The iThings And The Cloud](https://reader036.vdocument.in/reader036/viewer/2022070304/54b8e07c4a79593d278b45af/html5/thumbnails/9.jpg)
5 Tier Model – Protect Your Data
Public Application
Slightly Confidential
Basic
Intermediate
Managed Equivalent In
crea
sing
acc
ess
to d
ata
with
enha
nced
sec
urity
capa
bilit
ies