Enviar pesquisa
Carregar
Critical Considerations for Mobile and IoT Strategy
•
0 gostou
•
877 visualizações
CA Technologies
Seguir
Critical Considerations for Mobile and IoT Strategy
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 38
Baixar agora
Baixar para ler offline
Recomendados
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
CA Technologies
Applying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
CA Technologies
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...
Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...
CA Technologies
Securing your API Portfolio with API Management
Securing your API Portfolio with API Management
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
Mais conteúdo relacionado
Mais procurados
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
CA Technologies
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
CA Technologies
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
CA Technologies
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
CA Technologies
Mais procurados
(20)
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Destaque
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
Alex G. Lee, Ph.D. Esq. CLP
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Alex G. Lee, Ph.D. Esq. CLP
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
Deloitte United States
Consumer vs industrial IoT
Consumer vs industrial IoT
Plamen Kiradjiev
Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]
Thanakrit Lersmethasakul
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
Hakyong Kim
Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]
Thanakrit Lersmethasakul
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Alex G. Lee, Ph.D. Esq. CLP
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Hakyong Kim
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
Thanakrit Lersmethasakul
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
Hakyong Kim
Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]
Thanakrit Lersmethasakul
사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!
Hakyong Kim
ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략
Hakyong Kim
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
Hakyong Kim
The Age of the IOT & Digital Business
The Age of the IOT & Digital Business
Magnolia
IoT architecture
IoT architecture
Sumit Sharma
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
Edureka!
Destaque
(19)
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
Consumer vs industrial IoT
Consumer vs industrial IoT
Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]
사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!
ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
The Age of the IOT & Digital Business
The Age of the IOT & Digital Business
IoT architecture
IoT architecture
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
Semelhante a Critical Considerations for Mobile and IoT Strategy
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
CA Technologies
Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016
Jayesh Menon
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
Top Software Development Trends in 2024
Top Software Development Trends in 2024
Mind IT Systems
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry
Guide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail Marketing
Charlotte Brook
ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016
Uren Dhanani
Department of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
immixGroup
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Builtio
The Road to a Cloud-First Enterprise
The Road to a Cloud-First Enterprise
Leon Stigter
INGENIA: offshoring software development services for FinTech
INGENIA: offshoring software development services for FinTech
Ingeniería e Integración Avanzadas (Ingenia)
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
ForgeRock
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
immixGroup
Forecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A Monthly
Corum Group
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
Insights success media and technology pvt ltd
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
ForgeRock
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
Francisco Maroto
Semelhante a Critical Considerations for Mobile and IoT Strategy
(20)
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
Top Software Development Trends in 2024
Top Software Development Trends in 2024
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
Guide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail Marketing
ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016
Department of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
The Road to a Cloud-First Enterprise
The Road to a Cloud-First Enterprise
INGENIA: offshoring software development services for FinTech
INGENIA: offshoring software development services for FinTech
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Forecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A Monthly
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
Mais de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Mais de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Último
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
Jamie (Taka) Wang
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
David Newbury
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
Adam Moalla
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
Martin Humpolec
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
shyamraj55
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Pedro Manuel
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
Matsuo Lab
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Daniel Santiago Silva Capera
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Adtran
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
DianaGray10
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
Asko Soukka
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
YounusS2
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UbiTrack UK
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
Mahmoud Rabie
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Md Hossain Ali
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Will Schroeder
Introduction to Quantum Computing
Introduction to Quantum Computing
GDSC PJATK
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
DianaGray10
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
infogdgmi
Último
(20)
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Introduction to Quantum Computing
Introduction to Quantum Computing
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
Critical Considerations for Mobile and IoT Strategy
1.
World® ’16 Critical Considerations for Mobile and IoT Strategy K. Scott Morrison - Distinguished Engineer -
CA Technologies DO3X80V DEVOPS
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract In today's digital economy, when the growth of mobile apps and Internet of Things (IoT) devices is exploding everywhere, it’s important to understand how to plan for such growth within your enterprise. Considerations range from security, integration, identity management and encryption to scaling for IoT architectures. Join this session to hear Scott Morrison explain the seven critical considerations for mobile and IoT
strategy. K. Scott Morrison CA Technologies Distinguished Engineer
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mobile Optimization Is Now a Given for Business Processes World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD4
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Enterprise Mobility Concerns 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
6.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD6 ✓ Network separation ✓ No programmatic access from the public Internet ✓
Safety through total isolation and control In the Old Days, Apps Lived Inside the Firewall Database Web App Servers World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD6
7.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD7 ✓ Apps handle (and mishandle) user credentials ✓ Firewalls designed to inspect human-readable markup can miss API attack vectors ✓
Security standards designed for enterprise (e.g. WS-*, SAML) are not ideal for lightweight mobile apps But Now Mobile Apps Need Programmatic Access to Business Services… Data TiersBusiness Service APIs World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD7
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ••http://recode.net/2014/10/13/snapchat-blames-third-party-apps-for-hack-raising-questions-about-its-own-api/ ••http://www.programmableweb.com/news/why-attack-buffer-was-serious-wake-call-web/analysis/2013/11/04Social Media Services ••http://www.programmableweb.com/news/yahoo-breach-involved-api-servers/elsewhere-web/2014/10/07 Leading Web Portal ••http://www.shubhro.com/2014/12/18/reverse-engineering-kayak-mitmproxy/ Travel Broker ••http://www.developer-tech.com/news/2015/jan/08/moonpigs-api-breach-could-cost-its-business/ Dot Com Company ••http://www.securityweek.com/api-vulnerability-exposed-accounts-delmarva-power-customers Energy Company ••http://www.pcworld.com/article/2138400/hacked-passwords-can-enable-remote-unlocking-tracking-of-tesla-cars.html Auto Manufacturer Old Perimeter Security Mechanisms Are Failing
9.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD9 ✓ Adopt new access controls designed to prevent mishandling of user credentials ✓ Include API firewalls ✓
Replace or bridge to existing security systems But Now Mobile Apps Need Programmatic Access to Business Services… Data TiersBusiness Service APIs World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD9
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Enterprise Mobility Concerns 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Demand for Mobile Apps Has Exceeded It’s Ability to Deliver
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mobile Real Estate Inspires a Whole New Lifestyle © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD12
13.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD13 The First Way Most Business Fail at Mobility Is by Attempting to Stuff Their Customer and/or Employee Portals Into a Mobile Browser It doesn’t fit… World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD13
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#2: Offering Apps That Suit the Mobile Lifestyle • Concentrate on focused experiences •
Plan to use native device capabilities • Avoid frustrating text input (e.g. for login) 14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We’re Totally Different People When We’re Mobile World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD15
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mobile Users Are Busy, Distracted & Impatient © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD16
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#3: Supporting Identities That the User Already Trusts Doesn’t allowing the use of some of these identities open up new risks for exploits such as identity theft? Yes, indeed, but there are ways to mitigate these risks in ways appropriate to your business… more about that later. ü Social Identities ü
Bank Cards ü Phone numbers
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Enterprise Mobility Concerns 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Integration Is Still the Biggest Cost in Mobile Projects
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How Mobility Is Used Today in Your Organization? 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#4: Plan for Integrations With Enterprise Systems ü Enterprise User Directory ü
Enterprise Applications ü Web Portal Infrastructure
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Enterprise Mobility Concerns 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Loss Is a Serious Threat in the Mobile World 23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
24.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD24 ✓ On device ✓ During transmission ✓
At rest in enterprise or cloud Encrypt ALL of the Data Cloud Storage On Prem Storage On Device Storage World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD24
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#5: Store and Transfer Enterprise Data Securely ü Consider using Private Clouds ü
Always encrypt on-device data ü Keep data in motion encrypted
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Top Enterprise Mobility Concerns 1 1 SOTI Survey results: 118 ITDMs responded, September 22-29, 2015
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enabling Communication & Collaboration Is the Next Big Thing World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD27
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#6: Foster Communication & Collaboration Build communication features in your app Exchange your data via secure channels Implement bi-directional real-time notifications
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Future Is Already Here – It’s Just Not Evenly Distributed © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD29
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CC#7: Start Planning for a Scalable IoT Architecture Plan for deploying IoT aggregators / Gateways ü
Less sophisticated endpoint devices ü Consolidate disparate endpoint protocols into the IoT platform protocol ü Consolidate and scale device management ü Add intelligence to perform analytics
31.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD31 Our Enterprise Mobile & IoT Vision Simplify complex security, interactivity and backend integration challenges using developer-friendly interfaces Increase the Speed of Enterprise Mobile App Development Unlock Enterprise DataShare Data Securely
32.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD32 Unlock Enterprise Data Rapid Creation of Enterprise-class APIs From Data Sources Unlock Enterprise DataShare Data Securely
33.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD33 Secure Mobile Collaboration Enterprise Mobile & IoT Collaboration, Made Simple and Secure Unlock Enterprise DataShare Data Securely
34.
World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD34 Essential mobile services, delivered safe and secure ✓ Deliver IoT and Mobile apps faster ✓ Reduce security exposure ✓
Gain control over foundation services CA Mobile App Gateway/Mobile App Services Secure Mass Storage User Directory Secure Pub/Sub SDK SDK SDK • Simplified authentication and token mgmt. • Secure MQTT Pub/Sub messaging • Secure cloud and on-device storage • Dynamic user/group mgmt. Authentication and API Security Device-native SDKs World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD34
35.
35 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Seven Critical Considerations for Mobile and IoT Strategy 1.
Ensuring the security of enterprise data and services 2. Offering apps that suit the mobile lifestyle 3. Supporting identities that users already trust 4. Preparing for integration with enterprise systems 5. Encrypting data still and in motion 6. Fostering communication and collaboration 7. Planning for a scalable IoT architecture World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD35
36.
36 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
37.
37 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
38.
38 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD DevOps – API Management and Application Development For more information on DevOps –
API Management and Application Development, please visit: http://cainc.to/DL8ozQ
Baixar agora