In today’s mobile world, more and more employees are using mobile devices such as smartphones or tablets to access cloud services to conduct their business on a day-to-day basis. Enterprise mobility refers to this shift in business practices in organization.
More info here.
We thank everyone who tuned in. Good Night.
As Shan said earlier, we now know most of these jargon words.
Questions will be asked from Shan now.
With that note, Shanmugarajah concludes his session.
MEAP is a mobile app IDE and back-end web service to manage mobile application and link them to enterprise application and database. – Shan
Mobile Back-end as a service and Mobile Enterprise Application Platform are the ways of Ent. App dev & Management. – Shan
Push notification is when the data is not pushed from a device but pulled every once and a while. – Shan
You should ask the end users to discover the app in the enterprise store and download it. – Shan
4th Challenge is to develop apps for these enterprise usage. Native, Hybrid and Web based are the types. Shan
3rd Challenge is ‘enterprise store’, where you write you own store to publish your apps. – Shan
Get used to Wrap your apps. This technique works for creating apps for enterprise. – Shan
Any software can be broke. I am saying just to make it a bit harder. – Shan
MAM is becoming more and more popular since people dont like their data to be breached in BYOD. – Shan
Data is protected, app is controlled remotely. This is called Mobile app management. – Shan
How can one control apps in the container?
Join Samsung knox and download SDK. –> Develop. – Shan
There is a good market for the knox based enterprise apps since there are are very few already available. – Shan
Dual persona is also a new approach coming into play when facing this data security problem. – Shan
Or else one could use a vmware app or use web based apps to use via browsers. – Shan
Putting a container to the app and the data is the new method so the other app cant share data. This is called mobile virtualization. – Shan
Even though MDM policy says they would not touch your personal data, will you be confident enough to allow? – Shan
By encrypting the data and also with password policy you can manage your mobile device security. – Shan
These data security can be faced in 2 ways.
1. Device Based
2. Application Based – Shan
How the data can be compromised? Losing and getting stolen. Malicious app attack. – Shan
Why the data is sensitive? highly confidential with a high impact.
Who can compromise ? both external and internal. – Shan
There are risks and benefits as well when one allows enterprise mobility. – Shan
If the device is always on the move, how can one control it? – Shan
The challenge here would be when your COPE or BYOD device is lacking data security. – Shan
BYOD (bring your own device) is when an employee is asked to bring their devices. – Shan
Ent. Nobility is employees working out of office using their devices.
Extended enterprise is when you give access to your resources to non-employee partners. – Shan
Data is stored on cloud, devices are owned by the employees. – Shan
And the current state is different. it is independent of the tech. – Shan
Previously, work happened inside a building. dependent on a single technology and resources were owned by the organization. – Shan
Ent. Mobility: it uses a lot of jargon terms which you might not be knowing. – Shan
Shan says he will be talking from the basics including introducing enterprise mobility.
He will be talking on Challenges in Enterprise Mobility and how to overcome them.
Sinnathamby Shanmugarajah from WSO2 is the speaker for tonight.
And here we go. we are starting off.
Since the crowd is less than expected, we will be waiting for a bit longer then we’ll start off.
Stay tuned with us since we will be bringing live updates from the event, once it commences.
We are coming to live from exilesoft for Colombo Mobile Meetup happening today.
Good evening everyone.