Top Banner
The iThings And The Cloud Consumerization of IT Dr. Jeannot Muller, VP, Head of Global Infrastructure Architecture, DEUTSCHE POST DHL, GBS IT Services 22 nd June 2011
10
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The iThings And The Cloud

The iThings And The Cloud

Consumerization of ITDr. Jeannot Muller,

VP, Head of Global Infrastructure Architecture,

DEUTSCHE POST DHL, GBS IT Services

22nd June 2011

Page 2: The iThings And The Cloud

Consumerization of IT

Securing the Enterprise Landscape

Protecting Data - Not Devices

Agenda

Page 3: The iThings And The Cloud

The Compute Continuum

Page 4: The iThings And The Cloud

Consumerization was a joke, then a threat, now obvious.

Workers expect greater access any time, any place on any device. They will either work with or against IT to make it happen.

While cloud computing gets a lot of media attention, consumerization of IT registers the highest level of concern by IT security decision-makers.

Consumerization of IT

Page 5: The iThings And The Cloud

IT needs to be prepared for the Compute Continuum:

Provide and align on requirements and priorities.

Abstract IT data and applications to function in diverse environments.

Move to cloud based service offering over time.

Establish a common development framework across devices.

Better Be Prepared

Page 6: The iThings And The Cloud

IT needs to be prepared for the Compute Continuum:

Provide and align on requirements and priorities.

Abstract IT data and applications to function in diverse environments.

Move to cloud based service offering over time.

Establish a common development framework across devices.

Better Be Prepared

Page 7: The iThings And The Cloud

SandboxSolution

Common Security Concept

Blackberry

• Only corporate container available

• Device = corporate container

• Private & corporate container available

• Sandbox = corporate container

• Deviceindependent

Corporate

Corp-orate

Private

• Security requirement: Private and corporate data must be separated (especially on private devices)

• As long as no options available to separate private and corporate data on a Blackberry: Device = corporate container

Comments

Page 8: The iThings And The Cloud

Securing The Landscape

Public available apps

Custom made apps for DPDHL

End-2-End Process

Approval process

Definition: Corporate Approved Apps

• Apps for professional aspects which are approved for installation to the smart devices’ corporate container

OrderDistri-bution

Mainte-nance

License Mgmt

Page 9: The iThings And The Cloud

5 Tier Model – Protect Your Data

Public Application

Slightly Confidential

Basic

Intermediate

Managed Equivalent In

crea

sing

acc

ess

to d

ata

with

enha

nced

sec

urity

capa

bilit

ies