Top Banner
World ® ’1 6 Critical Considerations for Mobile and IoT Strategy K. Scott Morrison - Distinguished Engineer - CA Technologies DO3X80V DEVOPS
38

Critical Considerations for Mobile and IoT Strategy

Jan 07, 2017

Download

Technology

CA Technologies
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Critical Considerations for Mobile and IoT Strategy

World®’16

CriticalConsiderationsforMobileandIoT StrategyK.ScottMorrison- DistinguishedEngineer- CATechnologies

DO3X80V

DEVOPS

Page 2: Critical Considerations for Mobile and IoT Strategy

2 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

©2016CA.Allrightsreserved.Alltrademarksreferencedhereinbelongtotheirrespectivecompanies.

Thecontentprovidedinthis CAWorld2016presentationisintendedforinformationalpurposesonlyanddoesnotformanytypeofwarranty. The informationprovidedbyaCApartnerand/orCAcustomerhasnotbeenreviewedforaccuracybyCA.

ForInformationalPurposesOnlyTermsofthisPresentation

Page 3: Critical Considerations for Mobile and IoT Strategy

3 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Abstract

Intoday'sdigitaleconomy,whenthegrowthofmobileappsandInternetofThings(IoT)devicesisexplodingeverywhere,it’simportanttounderstandhowtoplanforsuchgrowthwithinyourenterprise.Considerationsrangefromsecurity,integration,identitymanagementandencryptiontoscalingforIoT architectures.JointhissessiontohearScottMorrisonexplainthesevencriticalconsiderationsformobileandIoT strategy.

K.ScottMorrisonCATechnologiesDistinguishedEngineer

Page 4: Critical Considerations for Mobile and IoT Strategy

4 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

MobileOptimizationIsNowaGivenforBusinessProcesses

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD4

Page 5: Critical Considerations for Mobile and IoT Strategy

5 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TopEnterpriseMobilityConcerns1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 6: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD6

✓ Networkseparation✓ NoprogrammaticaccessfromthepublicInternet✓ Safetythroughtotalisolationandcontrol

IntheOldDays,AppsLivedInsidetheFirewall

DatabaseWebAppServers

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD6

Page 7: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD7

✓ Appshandle(andmishandle)usercredentials✓ Firewallsdesignedtoinspecthuman-readablemarkupcanmissAPIattackvectors✓ Securitystandardsdesignedforenterprise(e.g.WS-*,SAML)arenotidealforlightweightmobileapps

ButNowMobileAppsNeedProgrammaticAccesstoBusinessServices…

DataTiersBusinessServiceAPIs

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD7

Page 8: Critical Considerations for Mobile and IoT Strategy

8 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

••http://recode.net/2014/10/13/snapchat-blames-third-party-apps-for-hack-raising-questions-about-its-own-api/••http://www.programmableweb.com/news/why-attack-buffer-was-serious-wake-call-web/analysis/2013/11/04SocialMediaServices

••http://www.programmableweb.com/news/yahoo-breach-involved-api-servers/elsewhere-web/2014/10/07LeadingWebPortal

••http://www.shubhro.com/2014/12/18/reverse-engineering-kayak-mitmproxy/TravelBroker

••http://www.developer-tech.com/news/2015/jan/08/moonpigs-api-breach-could-cost-its-business/DotComCompany

••http://www.securityweek.com/api-vulnerability-exposed-accounts-delmarva-power-customersEnergyCompany

••http://www.pcworld.com/article/2138400/hacked-passwords-can-enable-remote-unlocking-tracking-of-tesla-cars.htmlAutoManufacturer

OldPerimeterSecurityMechanismsAreFailing

Page 9: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD9

✓ Adoptnewaccesscontrolsdesignedtopreventmishandlingofusercredentials✓ IncludeAPIfirewalls✓ Replaceorbridgetoexistingsecuritysystems

ButNowMobileAppsNeedProgrammaticAccesstoBusinessServices…

DataTiersBusinessServiceAPIs

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD9

Page 10: Critical Considerations for Mobile and IoT Strategy

10 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TopEnterpriseMobilityConcerns1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 11: Critical Considerations for Mobile and IoT Strategy

11 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TheDemandforMobileAppsHasExceededIt’sAbilitytoDeliver

Page 12: Critical Considerations for Mobile and IoT Strategy

12 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

MobileRealEstateInspiresaWholeNewLifestyle

©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD12

Page 13: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD13

TheFirstWayMostBusinessFailatMobilityIsbyAttemptingtoStuffTheirCustomerand/orEmployeePortalsIntoaMobileBrowser

Itdoesn’tfit…

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD13

Page 14: Critical Considerations for Mobile and IoT Strategy

14 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#2:OfferingAppsThatSuittheMobileLifestyle

• Concentrateonfocusedexperiences

• Plantousenativedevicecapabilities

• Avoidfrustratingtextinput(e.g.forlogin)

14 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 15: Critical Considerations for Mobile and IoT Strategy

15 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

We’reTotallyDifferentPeopleWhenWe’reMobile

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD15

Page 16: Critical Considerations for Mobile and IoT Strategy

16 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

MobileUsersAre

Busy,Distracted

&Impatient

©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD16

Page 17: Critical Considerations for Mobile and IoT Strategy

17 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#3:SupportingIdentitiesThattheUserAlreadyTrusts

Doesn’tallowingtheuseofsomeoftheseidentitiesopenupnewrisksforexploitssuchasidentitytheft?Yes,indeed,buttherearewaystomitigatetheserisksinwaysappropriatetoyourbusiness…moreaboutthatlater.

ü SocialIdentities

ü BankCards

ü Phonenumbers

Page 18: Critical Considerations for Mobile and IoT Strategy

18 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TopEnterpriseMobilityConcerns1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 19: Critical Considerations for Mobile and IoT Strategy

19 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

IntegrationIsStilltheBiggestCostinMobileProjects

Page 20: Critical Considerations for Mobile and IoT Strategy

20 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

HowMobilityIsUsedTodayinYourOrganization?1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 21: Critical Considerations for Mobile and IoT Strategy

21 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#4:PlanforIntegrationsWithEnterpriseSystems

ü EnterpriseUserDirectory

ü EnterpriseApplications

ü WebPortalInfrastructure

Page 22: Critical Considerations for Mobile and IoT Strategy

22 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TopEnterpriseMobilityConcerns1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 23: Critical Considerations for Mobile and IoT Strategy

23 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

DataLossIsaSeriousThreatintheMobileWorld

23 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 24: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD24

✓ Ondevice✓ Duringtransmission✓ Atrestinenterpriseorcloud

EncryptALLoftheData

CloudStorage

OnPremStorage

OnDeviceStorage

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD24

Page 25: Critical Considerations for Mobile and IoT Strategy

25 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#5:StoreandTransferEnterpriseDataSecurely

ü ConsiderusingPrivateClouds

ü Alwaysencrypton-devicedata

ü Keepdatainmotionencrypted

Page 26: Critical Considerations for Mobile and IoT Strategy

26 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TopEnterpriseMobilityConcerns1

1SOTISurveyresults:118ITDMsresponded,September22-29,2015

Page 27: Critical Considerations for Mobile and IoT Strategy

27 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

EnablingCommunication&CollaborationIstheNextBigThing

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD27

Page 28: Critical Considerations for Mobile and IoT Strategy

28 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#6:FosterCommunication&Collaboration

Buildcommunicationfeaturesinyourapp

Exchangeyourdataviasecure channels

Implementbi-directionalreal-timenotifications

Page 29: Critical Considerations for Mobile and IoT Strategy

29 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TheFutureIsAlreadyHere– It’sJustNotEvenlyDistributed

©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD29

Page 30: Critical Considerations for Mobile and IoT Strategy

30 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CC#7:StartPlanningforaScalableIoT Architecture

PlanfordeployingIoTaggregators/Gateways

ü Lesssophisticatedendpointdevicesü ConsolidatedisparateendpointprotocolsintotheIoT

platformprotocolü Consolidateandscaledevicemanagementü Addintelligencetoperformanalytics

Page 31: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD31

OurEnterpriseMobile&IoTVision

Simplifycomplexsecurity,interactivityandbackendintegrationchallengesusing

developer-friendlyinterfaces

Increase theSpeedofEnterpriseMobileAppDevelopment

UnlockEnterpriseDataShare

DataSecurely

Page 32: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD32

UnlockEnterpriseData

RapidCreationofEnterprise-classAPIsFromDataSources

UnlockEnterpriseDataShare

DataSecurely

Page 33: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD33

SecureMobileCollaboration

EnterpriseMobile&IoTCollaboration,MadeSimple andSecure

UnlockEnterpriseDataShare

DataSecurely

Page 34: Critical Considerations for Mobile and IoT Strategy

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD34

Essentialmobileservices,deliveredsafeandsecure✓ DeliverIoTandMobileappsfaster✓ Reducesecurityexposure✓ Gaincontroloverfoundationservices

CAMobileAppGateway/MobileAppServices

SecureMassStorage

UserDirectory

SecurePub/Sub

SDK

SDK

SDK

• Simplifiedauthenticationandtokenmgmt.• SecureMQTTPub/Submessaging• Securecloudandon-devicestorage• Dynamicuser/groupmgmt.

AuthenticationandAPISecurity

Device-nativeSDKs

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD34

Page 35: Critical Considerations for Mobile and IoT Strategy

35 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

SevenCriticalConsiderationsforMobileandIoT Strategy

1. Ensuringthesecurityofenterprisedataandservices2. Offeringappsthatsuitthemobilelifestyle3. Supportingidentitiesthatusersalreadytrust4. Preparingforintegrationwithenterprisesystems5. Encryptingdatastillandinmotion6. Fosteringcommunicationandcollaboration7. PlanningforascalableIoTarchitecture

World®’16©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD35

Page 36: Critical Considerations for Mobile and IoT Strategy

36 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Questions?

Page 37: Critical Considerations for Mobile and IoT Strategy

37 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Stayconnectedatcommunities.ca.com

Thankyou.

Page 38: Critical Considerations for Mobile and IoT Strategy

38 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

DevOps– APIManagementandApplicationDevelopment

FormoreinformationonDevOps– APIManagementandApplicationDevelopment,pleasevisit:http://cainc.to/DL8ozQ