The iThings And The Cloud Consumerization of IT Dr. Jeannot Muller, VP, Head of Global Infrastructure Architecture, DEUTSCHE POST DHL, GBS IT Services 22 nd June 2011
The iThings And The Cloud
Consumerization of ITDr. Jeannot Muller,
VP, Head of Global Infrastructure Architecture,
DEUTSCHE POST DHL, GBS IT Services
22nd June 2011
Consumerization of IT
Securing the Enterprise Landscape
Protecting Data - Not Devices
Agenda
The Compute Continuum
Consumerization was a joke, then a threat, now obvious.
Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.
While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.
Consumerization of IT
IT needs to be prepared for the Compute Continuum:
Provide and align on requirements and priorities.
Abstract IT data and applications to function in diverse environments.
Move to cloud based service offering over time.
Establish a common development framework across devices.
Better Be Prepared
IT needs to be prepared for the Compute Continuum:
Provide and align on requirements and priorities.
Abstract IT data and applications to function in diverse environments.
Move to cloud based service offering over time.
Establish a common development framework across devices.
Better Be Prepared
SandboxSolution
Common Security Concept
Blackberry
• Only corporate container available
• Device = corporate container
• Private & corporate container available
• Sandbox = corporate container
• Deviceindependent
Corporate
Corp-orate
Private
• Security requirement: Private and corporate data must be separated (especially on private devices)
• As long as no options available to separate private and corporate data on a Blackberry: Device = corporate container
Comments
Securing The Landscape
Public available apps
Custom made apps for DPDHL
End-2-End Process
Approval process
Definition: Corporate Approved Apps
• Apps for professional aspects which are approved for installation to the smart devices’ corporate container
OrderDistri-bution
Mainte-nance
License Mgmt
5 Tier Model – Protect Your Data
Public Application
Slightly Confidential
Basic
Intermediate
Managed Equivalent In
crea
sing
acc
ess
to d
ata
with
enha
nced
sec
urity
capa
bilit
ies