SlideShare a Scribd company logo
1 of 52
Download to read offline
© 2014 VMware Inc. All rights reserved.
VMware Workspace ONE
Lorenzo Di Palma
VMware EUC Specialist
End-User Computing
used to be easier …
… now it’s all about
choices:
§ Devices
§ Applications
§ Architectures
§ Ownership
§ Mobility
… AND it has to add tangible
value to the business!!
The Changing IT Landscape
… everything was locked down,
easy to manage …
§ Operating costs are high and rising
– so busy farming the old technology, can’t embrace the new
§ Management / security processes configuration-based
– discourages diversity and inhibits change
§ We no longer own all the assets
– control and relevance is already slipping away
Fundamentally,
the Old Ways Just
No Longer Work
The transformation of end user computing is inevitable …
… but
to
what?
Mobile and
Cloud FIRST
Doing
Windows
BETTER
Transformation
Choices
Traditional
End-User
Computing
Eg.
• Physical PCs
• HW refresh
• PCLM
• Windows XP/7/8
• Windows apps
• MS Office
Windows
Transformed
Eg.
• Virtualized desktops
• Remoted apps
• Device diversity
PCLM and EMM
• Windows apps
• MS Office
Native
Mobility
Eg.
• Any device
• Any OS
• EMM
• SaaS and Web apps
• MS Office 365
?
• iTunes
• Apple ID
• App Store
• iWork
• iCloud
• GmailAccount
• Google Play
• G Suite
• Google Drive
• Microsoft ID
• AD/Azure AD
• Office 365
• Windows Store
Update Service
• SCCM
• Salesforce 1
• Concur
• Workday
• Slack
• Dropbox
• Docusign
Mobile Team Desktop Team LOB
iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS
A Platform Approach Breaks Silos and Delivers a Digital
Workspace
Connected
Things
(Rugged / IoT)
Identity and Access Management
Unified Catalog Single-Sign On Authentication Access Policy
Digital Workspace Platform
End-User Services Team
iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS
New Approach
Manage and secure
apps and content
Device Trust established
through enrollment
Access Controlled by
Identity Management
Drive a New Approach to Mobile Security and Identity
Old Mindset
Only trust devices where
you manage the OS
Device Trust established
by the Domain
Access Controlled by
Network Management
Challenges Organizations Face with Identity
Protecting apps and data
from unauthorized
access is important but
authentication and ease
of use needs to be
straightforward
Enforce security
and compliance
without hampering
workers
Employees and their devices
are increasingly on the go.
Access control to apps
becomes more important
than networks. Device
diversity adds to the
complexity
Time and complexity
in delivering new
apps and services
Real-time visibility, proactive
alerting, reporting and
analytics are all required to
know what apps are being
used, when, and by whom.
This helps manage licensing,
SLAs, and maintenance
windows
Gaining visibility
into user access.
Who has access to
when, and when
Complexity of scale
and growth
(Operations,
Helpdesk)
A general state of readiness to
scale as traffic, users and devices
grow in number across the
organization
CONSUMER
EXPECTATIONS
DELAYS IN APP
DEPLOYMENTS
COMPLIANCE
NIGHTMARES
OPERATIONS
UNDERWATER
7 “Must Haves” for a Cloud / Mobile Identity Management Solution
1
Directory Integration2
Policy Management
3
Application Provisioning
4
Analytics / Reporting
5
Cross-device Catalog and Launcher
• Be easy to use and reduce complexity
• Increase productivity
• Meet security & compliance requirements
• Automate and streamline onboarding and revocation
• Reduce help deskticket costs
• Support any type of device and OS
• Support mobile and SaaS apps
ANDTHESOLUTIONMUST
6
Single-Sign-on
7
Multi-Factor Authentication
10
Web Apps
ThinApp
Horizon Desktop
Horizon HostedApp
Office 365
Citrix XenApps
App Catalog
Context Aware
Custom Branding
App Access Through Workspace ONE
Native
mobile apps
Web apps
On-prem
apps
Virtual apps
OR
In-house mobile apps
Public mobile apps
Unified Workspace
with entitled apps
Workspace ONE
Self Service Access - Mobile Single Sign On
Workspace™ ONE™
Secure App Token System
SaaS Apps
TRUST
Trust ID Key
Cloud
Mobile SSO - Secure App Token System
• Commonly known as “Cloud KDC”
• Provides Single Sign-On (SSO) for iOS SAML enabled apps
• No need for Corporate VPN
• No need for manually entering credentials
• Uses:
• iOS 9 built-in Kerberos functionality
• IDM hosted Kerberos adapter
• IDM hosted KDC
One-Touch mobile SSO
CONFIDENTIAL 14
• Industry’s first one-touch single-sign on (SSO) for public
mobile apps
• Device Trust Authentication: the device itself becomes a
factor of authentication to anchor an SSO experience.
• The app is only available to that device, and the user must
still be able to unlock the device.
• Many people associate touch ID as a form of authentication
for SSO, but...
• touch ID only unlocks a device, taking the place of pin code
entry, which is always a backup to touch ID.
• Workspace ONE supports pin-code entry or touch ID as
another quick assurance that a device is still with its owner.
Workspace ONE: Multi-Factor Authentication
vmware verify
15CONFIDENTIAL
16CONFIDENTIAL
Launch and SSO to
non-SAML web apps
Capture, store, and
replay password
Chrome, Firefox, IE
supported
Training mode for
customer admins
New Browser Extension for password vaulting
and SSO to Non-Federated Apps
16
DEMO VIDEO
https://www.youtube.com/watch?v=0lk-
nXL16ik&feature=youtu.be
Workspace ONE: Keep Barriers Between Work and Personal
17
Separate work and personal apps
Prevent data flow between work
and personal apps
Allow IT to only manage and secure the
work apps and data
X
Security Across Key Applications
18
Content Locker
Browser
Boxer
Secure and Integrated Access Across Apps
Open attachments
Browse links
Open downloads
Browselinks
Share content
Workspace Services Profile
More diverse app ecosystem
Better security and configuration capabilities
Requires profile on the device
Privacy concerns in BYOD deployments
2
O/SMAM
App Container1
Doesn’t require profile installation
Ideal for BYOD deployments
Limits app ecosystem
Requires proprietary SDK
STANDALONEMAM
Only approved, authorized apps
installed in corporate container
Organizations can detect jailbroken or
rooted devices and take compliance
action
Separate workand personal apps
Stand Alone MAM vs. O/S MAM
19
NATIVEO/SMAM
STANDALONEMAM
Enterprise Secure
Adaptive Management: Productivity Without Compromising Privacy
20
Download Secure
App
Access All Business
Apps
Enhanced Security and
Experience
Workspace ONE for All Use Cases
ADAPTIVE MANAGEMENT
iOS
• Adaptive Management
– User can see upfront what features they get by enrolling their device
– Privacy notice: to enable the user to see exactly what information is collected by AirWatch
– Device management using a limited MDM capabilities
• Container Functionality
– Support for AirWatch productivity apps without enrollment
– Ability to install native public apps from the app store without device management
• Kerberos Based SSO for Native Applications
21
Android
• Adaptive Management
– User can see upfront what features they get by enrolling their device.
– Privacy notice: to enable the user to see exactly what information is collected by AirWatch.
– Device management using Android for Work.
• Container Functionality
– Support for AirWatch productivity apps without enrollment.
– Ability to install native public apps from the app store without device management.
• Certificate Based SSO (requires agent, tunnel server and client)
– Will require agent with version 2 of the app
– Requirement for agent will be removed with version 2.1
– Requirement for tunnel server will be removed in version 2.1
22
Windows 10
• Adaptive Management
– User can see upfront what features they get by enrolling their device
– Privacy notice: to enable the user to see exactly what information is collected by AirWatch
– Device management using native MDM for Windows
23
Create Compliance Policies for User Groups and Devices
24
App
whitelists
App
blacklists
Required
apps
Current
app
version
Assignment
criteria
Remediate
immediately
Send push
notifications
Uninstall
apps
Policies Actions
Pervasive Security: Datacenter to Device to App
Data
Center
Multi-layered Defense for the Secure Digital Workspace
25
Virtual
DesktopDevice
Per-app
micro-VPN
NSX Micro-
segmentation
+
AirWatch Horizon 7
VMware NSX for AirWatch
26
Device Level VPN
Full Network Access
App Level VPN
Select Network Access
Micro Segmentation with NSX
App Level VPN
Full Network Access
VMware NSX for AirWatch
CONFIDENTIAL 27
Advanced security between an
AirWatch-managed device and
the NSX micro-segmented
cloud data center
VMware Workspace ONE – an Identity Management Summary
Build an App Catalog
• Install apps directly onto springboard or access through responsive HTML5 app portal
• Auto-Provisioning Workflows
Federate User Identity
• SSO with Domain Login
• Permits Strong Authentication - Provision and revoke access instantly
One-Touch Authentication
• No configuration or login required
• Leverage device ownership and unlock to establish authentication
Conditional Access
• Managed or Unmanaged devices, Network Scope, Authentication Strength
• Set policy levels by app
Secure Data on Device
• Encrypt and wipe application data using optional AirWatch Mobility Management
• Apply Device-based restrictions (cut/copy/camera/GPS/Open in)
✔ ✗
Identity and Access Management
Unified Catalog Single-Sign On Authentication Access Policy
AirWatch Unified EndpointManagement(UEM)
Management Context
End-User Services Team
iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS
Unified Endpoint Management - One Platform For All Use Cases Open
Ecosystem
App Config
Community
Mobile
Security
Alliance
Authentication
and Identity
Providers
Connected
Things
(Rugged / IoT)
Virtualize
Onboard Devices Quickly And Without IT Hassle
Configure devices to be automatically
configured during initial power ON
Corporate Owned Devices
Out of Box Enrollment
Enable users to activate work services
on devices through a simple workflow
BYOD
End User Self Service
• Restrictions
• Device layout
• Settings access
• Notifications
• Location services
• Bluetooth
• Branding
• Internal and public apps
• Volume purchased apps
• Enterprise app catalog
• Single sign-on
• DLP and security policies
• App tunneling
• Corporate email
• Calendar and contacts
• Wi-Fi
• VPN
• Content repositories
• Intranet sites
Configure Devices with Apps and Resources
Devices Apps Systems
Manage Industrial Devices in Modern Framework
Industrial
• Device staging
• Provisioning framework
• Multi app launcher
• Remote management
• Developer tools
Gain Visibility Over Peripherals
Centrally
Deploy
• Standardize
onboarding
Closely
Monitor
• Asset tracking
• Device pairing
• Usage and life
expectancy
Proactively
Manage
• Alerts and settings
• Automated reports
Control Device Layout and Manage Apps
App Kiosk
• Single or Multiple apps
• Custom branding
• Layout defined
• Restricted settings
Enable Multiple Employees to Share a Single Device
Multiuser
• User check-in and out
• Custom profile by user
• Settings restricted
• Custom branding
Secure the Endpoint and Prevent Data Loss
Encryption
Device level
encryption
Hardware security
Biometric integration
Passcode
Complexity
Expiration
Device and app
Data
Sharing permissions
Copy / paste
Geofencing
Watermark
Data backups
Wi-Fi
TLS
Siri
Always-on
VPN
Whitelist
Blacklist
Tethering
Settings
ConfigurationsCompromised
Jailbroken
Remote wipe
Malware
Gain Real-time Insights and Remotely Support Users
Dynamic and modular dashboards
Detailed and exportable reports
Comparative industry analytics
Advanced event and device logging
Integration to BI tools
End user self-serviceportal
Remote management and troubleshooting
Remote commands and notifications
Dynamic Dashboards Based on User Roles
HelpdeskAdmin
Security
Officer
App Admin
Content &
VideoAdmin
System Admin
Email
Admin
Multitenant Architecture with Role-based Access Controls
Easy Policy Configurations with Industry Templates
Configuration
Can Be
Overwhelming…
100s of devices
1,000s of configurations
Millions of apps
Industry Templates
Simplify device setup with right configurations, apps
and policies based on use cases within your industry
Intelligently Assign Based on Dynamic Groups
Smart
Groups
Automatically Configures
Dynamic Updates
SalesforceApp >
GlobalSales Team
Conference Room App >
Only Android v2.0+
APAC EmailServer>
All APAC Employees
Devices
Platform
OS and Versions
Ownership Model
Users
Executives
Engineering
Sales
Tags
Location
History
Integrate and Automate with Robust API Framework
Allow external systems to invoke core product functionality
Enrollment
Authentication
Admin Users
Applications
Content
Products
Tags
Device Groups
Custom Attribute
Device Details
Device Profiles
Email
Smart Groups
User Groups
Notifications
Third Party Solutions
(examples)
Internal Systems
Operations
Services
Proprietary
< extend >
Automated Compliance and Remediation
Set Rules
Define Actions
Perform Escalations
>
>
>
Customizable Experience for Your Users
Branding
Console | Apps | Self-Service Portal
Globalized
Available in 19 Languages
Extend Best-in-Class EMM with Critical PC Management Needs
Comprehensive unified endpoint management (UEM) features transforming the way IT manages Windows 10
Self-Service
Access & SSO
Co-exist with
Systems
Management
Deploy
Updates Off
the Network
Device Health
Attestation
Win32 App
Lifecycle
Management
Instant Push
Configuration
for Policies
GPOs On or
Off the
Domain
Windows
Information
Protection
Patch
Auditing
Granular
Updates
Management
5. Client Health &
Security
3. OS Patch
Management
4. Software
Distribution
2. Configuration
Management
1. MDM for Windows
Asset
Tracking
Device and OS Lifecycle Management
App Managementand
Delivery
End-to-end Security
Management
App
Inventory
BitLocker
Encryption
Enterprise
App Store
Imageless
Provisioning
In-place or
custom image
migration
Modern
Management
IntelligentInsights and Rules Engine
BIOS
Management
Delivery
Optimization
Automated
Compliance
New Windows 10 PC Management
Features for Next-Gen PCLM
Deploy
Patch
Configure
Apps
Windows 10 Provisioning Service for Dell
devices ensuring instant productivity
Windows Update Analytics & Automation
powered by Workspace ONE Intelligence
New use cases for hands free management
of Dell BIOS
Peer Distribution of software for scale,
infrastructurereduction and speed
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Productive User, IT
self-service featuresfor peak
user and IT experience
Reduced Costs
silo-less management at
reduced TCO
Improved Security
real-time compliance on any
network
Mitigates risks; drives
productivity and cost
savings.
Admin
GPO and app migration from
ConfigMgr/SCCM to AirWatch
Windows 10 ProvisioningService for Dell
Devices
Eliminate manual configuration of PCs and drop-ship straight to user
Business
Modern deployment solution
Employees productive day one
IT
Eliminate high touch PC setup
Respond faster to users in need
© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution
Trusted security
enable hardware and OS
level security at boot
Setup at initial boot
drop ship PC directly to
user; auto configuration
upon first booth
Auto configure
apps, security settings and
system policies over the airFactory End userDistributor System
Integrator
(Staging / Kitting)
IT
Department
Factory End user
WithWindows10
ProvisioningService
Current
Approach
Instant Productivity
new first launch experience
with Workspace ONE
47
What are the Issues with the Digital Workspace
48CONFIDENTIAL
Data Overload
Data
Reactive
Events
Visibility
Siloed Visibility
Processes
Manual Processes
Introducing Workspace ONE Intelligence
49CONFIDENTIAL
Complete Visibility
Proactive Automated Actions
ONE Data Lake
Workspace
ONE
Intelligence
Workspace ONE Intelligence
50CONFIDENTIAL
Enables data driven decisions
and actions from a single
source of truth
Apps
Networks
Sensors
Devices
Workspace
ONE
Intelligence
Security
Alerts
Reports
APIs
Dashboards
Is a new set of capabilities that
provide deep insights into the
entire digital workspace, enable
smart EMM planning and offer
powerful automation that
together increase security,
compliance and user experience
across the entire environment.
51CONFIDENTIAL
Workspace ONE Intelligence
CONFIDENTIAL
Rules engine
to automate
actions
Automation
Visibility into entire
environment
Insights
Data to make the
right decisions
Planning
Machine learning
to predict and
remediate
anomalies
Prediction
FUTURE
THANK YOU!!

More Related Content

What's hot

Microsoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanDavid J Rosenthal
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saasYukti Kaura
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual MachinesClint Edmonson
 
Windows Autopilot (1).pdf
Windows Autopilot (1).pdfWindows Autopilot (1).pdf
Windows Autopilot (1).pdfabhipotdar
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Enterprise Management Associates
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowAniekan Akpaffiong
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptxmasbulosoke
 
Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 

What's hot (20)

Microsoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by AtidanMicrosoft Office 365 for Enterprise - Presented by Atidan
Microsoft Office 365 for Enterprise - Presented by Atidan
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Cloud computing saas
Cloud computing   saasCloud computing   saas
Cloud computing saas
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual Machines
 
Windows Autopilot (1).pdf
Windows Autopilot (1).pdfWindows Autopilot (1).pdf
Windows Autopilot (1).pdf
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
 
Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365Modern Workplace with Microsoft 365
Modern Workplace with Microsoft 365
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & How
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Azure Backup Simplifies
Azure Backup SimplifiesAzure Backup Simplifies
Azure Backup Simplifies
 

Viewers also liked

VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANDuncan Epping
 
VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design Cormac Hogan
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e DesignVMUG IT
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overviewsolarisyougood
 
Výhody Software Defined Storage od VMware
Výhody Software Defined Storage od VMwareVýhody Software Defined Storage od VMware
Výhody Software Defined Storage od VMwareMarketingArrowECS_CZ
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short PresentationBarcamp Cork
 
Open source for you - November 2017
Open source for you - November 2017Open source for you - November 2017
Open source for you - November 2017Heart Disk
 

Viewers also liked (9)

VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
VMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSANVMworld 2017 - Top 10 things to know about vSAN
VMworld 2017 - Top 10 things to know about vSAN
 
VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design VMworld 2017 vSAN Network Design
VMworld 2017 vSAN Network Design
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
 
VMware virtual SAN 6 overview
VMware virtual SAN 6 overviewVMware virtual SAN 6 overview
VMware virtual SAN 6 overview
 
Výhody Software Defined Storage od VMware
Výhody Software Defined Storage od VMwareVýhody Software Defined Storage od VMware
Výhody Software Defined Storage od VMware
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Open source for you - November 2017
Open source for you - November 2017Open source for you - November 2017
Open source for you - November 2017
 

Similar to VMware Workspace ONE: A Platform Approach for the Digital Workspace

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Microsoft
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition OverviewNatalie Hewitt
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0Dilshan Edirisuriya
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 

Similar to VMware Workspace ONE: A Platform Approach for the Digital Workspace (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Duo Platform Edition Overview
Duo Platform Edition OverviewDuo Platform Edition Overview
Duo Platform Edition Overview
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 

More from Jürgen Ambrosi

Discover AI with Microsoft Azure
Discover AI with Microsoft AzureDiscover AI with Microsoft Azure
Discover AI with Microsoft AzureJürgen Ambrosi
 
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...Jürgen Ambrosi
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...Jürgen Ambrosi
 
Power BI Overview e la soluzione SCA per gli Atenei
 Power BI Overview e la soluzione SCA per gli Atenei Power BI Overview e la soluzione SCA per gli Atenei
Power BI Overview e la soluzione SCA per gli AteneiJürgen Ambrosi
 
HPC on Azure for Reserach
HPC on Azure for ReserachHPC on Azure for Reserach
HPC on Azure for ReserachJürgen Ambrosi
 
Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019Jürgen Ambrosi
 
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPRThreat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPRJürgen Ambrosi
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRJürgen Ambrosi
 
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...Jürgen Ambrosi
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoJürgen Ambrosi
 
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture ITProposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture ITJürgen Ambrosi
 
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360° Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360° Jürgen Ambrosi
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityJürgen Ambrosi
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementJürgen Ambrosi
 
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...Jürgen Ambrosi
 
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
Le soluzioni tecnologiche a supporto del mondo OpenStack e ContainerLe soluzioni tecnologiche a supporto del mondo OpenStack e Container
Le soluzioni tecnologiche a supporto del mondo OpenStack e ContainerJürgen Ambrosi
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize SuiteJürgen Ambrosi
 
Veritas - Software Defined Storage
Veritas - Software Defined StorageVeritas - Software Defined Storage
Veritas - Software Defined StorageJürgen Ambrosi
 

More from Jürgen Ambrosi (20)

Discover AI with Microsoft Azure
Discover AI with Microsoft AzureDiscover AI with Microsoft Azure
Discover AI with Microsoft Azure
 
IBM Cloud Platform
IBM Cloud Platform IBM Cloud Platform
IBM Cloud Platform
 
Laboratori virtuali
Laboratori virtualiLaboratori virtuali
Laboratori virtuali
 
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
Esploriamo Windows 10: nuove funzionalità e aggiornamenti. Potenziare l’esper...
 
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
I nuovi strumenti di comunicazione e collaborazione di Office 365 e la loro i...
 
Power BI Overview e la soluzione SCA per gli Atenei
 Power BI Overview e la soluzione SCA per gli Atenei Power BI Overview e la soluzione SCA per gli Atenei
Power BI Overview e la soluzione SCA per gli Atenei
 
HPC on Azure for Reserach
HPC on Azure for ReserachHPC on Azure for Reserach
HPC on Azure for Reserach
 
Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019Gruppo di lavoro ICT - attività 2019
Gruppo di lavoro ICT - attività 2019
 
Threat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPRThreat management lifecycle in ottica GDPR
Threat management lifecycle in ottica GDPR
 
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPRIdentity and Data protection with Enterprise Mobility Security in ottica GDPR
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
 
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
Proposte ORACLE per la gestione dei contenuti digitali e per la ricerca scien...
 
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativoProposte ORACLE per la modernizzazione dello sviluppo applicativo
Proposte ORACLE per la modernizzazione dello sviluppo applicativo
 
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture ITProposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
Proposte ORACLE per la modernizzazione del Datacenter e delle infrastrutture IT
 
Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360° Dalle soluzioni di BackUp & Recovery al Data management a 360°
Dalle soluzioni di BackUp & Recovery al Data management a 360°
 
Le soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuityLe soluzioni tecnologiche per il disaster recovery e business continuity
Le soluzioni tecnologiche per il disaster recovery e business continuity
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
L’assistente virtuale che informa gli studenti: l'esperienza del Politecnico ...
 
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
Le soluzioni tecnologiche a supporto del mondo OpenStack e ContainerLe soluzioni tecnologiche a supporto del mondo OpenStack e Container
Le soluzioni tecnologiche a supporto del mondo OpenStack e Container
 
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 Webinar Fondazione CRUI e VMware: VMware vRealize Suite Webinar Fondazione CRUI e VMware: VMware vRealize Suite
Webinar Fondazione CRUI e VMware: VMware vRealize Suite
 
Veritas - Software Defined Storage
Veritas - Software Defined StorageVeritas - Software Defined Storage
Veritas - Software Defined Storage
 

Recently uploaded

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Recently uploaded (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

VMware Workspace ONE: A Platform Approach for the Digital Workspace

  • 1. © 2014 VMware Inc. All rights reserved. VMware Workspace ONE Lorenzo Di Palma VMware EUC Specialist
  • 2. End-User Computing used to be easier … … now it’s all about choices: § Devices § Applications § Architectures § Ownership § Mobility … AND it has to add tangible value to the business!! The Changing IT Landscape … everything was locked down, easy to manage …
  • 3. § Operating costs are high and rising – so busy farming the old technology, can’t embrace the new § Management / security processes configuration-based – discourages diversity and inhibits change § We no longer own all the assets – control and relevance is already slipping away Fundamentally, the Old Ways Just No Longer Work
  • 4. The transformation of end user computing is inevitable … … but to what?
  • 5. Mobile and Cloud FIRST Doing Windows BETTER Transformation Choices Traditional End-User Computing Eg. • Physical PCs • HW refresh • PCLM • Windows XP/7/8 • Windows apps • MS Office Windows Transformed Eg. • Virtualized desktops • Remoted apps • Device diversity PCLM and EMM • Windows apps • MS Office Native Mobility Eg. • Any device • Any OS • EMM • SaaS and Web apps • MS Office 365 ?
  • 6. • iTunes • Apple ID • App Store • iWork • iCloud • GmailAccount • Google Play • G Suite • Google Drive • Microsoft ID • AD/Azure AD • Office 365 • Windows Store Update Service • SCCM • Salesforce 1 • Concur • Workday • Slack • Dropbox • Docusign Mobile Team Desktop Team LOB iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS A Platform Approach Breaks Silos and Delivers a Digital Workspace Connected Things (Rugged / IoT) Identity and Access Management Unified Catalog Single-Sign On Authentication Access Policy Digital Workspace Platform End-User Services Team iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS
  • 7. New Approach Manage and secure apps and content Device Trust established through enrollment Access Controlled by Identity Management Drive a New Approach to Mobile Security and Identity Old Mindset Only trust devices where you manage the OS Device Trust established by the Domain Access Controlled by Network Management
  • 8. Challenges Organizations Face with Identity Protecting apps and data from unauthorized access is important but authentication and ease of use needs to be straightforward Enforce security and compliance without hampering workers Employees and their devices are increasingly on the go. Access control to apps becomes more important than networks. Device diversity adds to the complexity Time and complexity in delivering new apps and services Real-time visibility, proactive alerting, reporting and analytics are all required to know what apps are being used, when, and by whom. This helps manage licensing, SLAs, and maintenance windows Gaining visibility into user access. Who has access to when, and when Complexity of scale and growth (Operations, Helpdesk) A general state of readiness to scale as traffic, users and devices grow in number across the organization CONSUMER EXPECTATIONS DELAYS IN APP DEPLOYMENTS COMPLIANCE NIGHTMARES OPERATIONS UNDERWATER
  • 9. 7 “Must Haves” for a Cloud / Mobile Identity Management Solution 1 Directory Integration2 Policy Management 3 Application Provisioning 4 Analytics / Reporting 5 Cross-device Catalog and Launcher • Be easy to use and reduce complexity • Increase productivity • Meet security & compliance requirements • Automate and streamline onboarding and revocation • Reduce help deskticket costs • Support any type of device and OS • Support mobile and SaaS apps ANDTHESOLUTIONMUST 6 Single-Sign-on 7 Multi-Factor Authentication
  • 10. 10 Web Apps ThinApp Horizon Desktop Horizon HostedApp Office 365 Citrix XenApps App Catalog Context Aware Custom Branding
  • 11. App Access Through Workspace ONE Native mobile apps Web apps On-prem apps Virtual apps OR In-house mobile apps Public mobile apps Unified Workspace with entitled apps Workspace ONE
  • 12. Self Service Access - Mobile Single Sign On Workspace™ ONE™ Secure App Token System SaaS Apps TRUST Trust ID Key Cloud
  • 13. Mobile SSO - Secure App Token System • Commonly known as “Cloud KDC” • Provides Single Sign-On (SSO) for iOS SAML enabled apps • No need for Corporate VPN • No need for manually entering credentials • Uses: • iOS 9 built-in Kerberos functionality • IDM hosted Kerberos adapter • IDM hosted KDC
  • 14. One-Touch mobile SSO CONFIDENTIAL 14 • Industry’s first one-touch single-sign on (SSO) for public mobile apps • Device Trust Authentication: the device itself becomes a factor of authentication to anchor an SSO experience. • The app is only available to that device, and the user must still be able to unlock the device. • Many people associate touch ID as a form of authentication for SSO, but... • touch ID only unlocks a device, taking the place of pin code entry, which is always a backup to touch ID. • Workspace ONE supports pin-code entry or touch ID as another quick assurance that a device is still with its owner.
  • 15. Workspace ONE: Multi-Factor Authentication vmware verify 15CONFIDENTIAL
  • 16. 16CONFIDENTIAL Launch and SSO to non-SAML web apps Capture, store, and replay password Chrome, Firefox, IE supported Training mode for customer admins New Browser Extension for password vaulting and SSO to Non-Federated Apps 16 DEMO VIDEO https://www.youtube.com/watch?v=0lk- nXL16ik&feature=youtu.be
  • 17. Workspace ONE: Keep Barriers Between Work and Personal 17 Separate work and personal apps Prevent data flow between work and personal apps Allow IT to only manage and secure the work apps and data X
  • 18. Security Across Key Applications 18 Content Locker Browser Boxer Secure and Integrated Access Across Apps Open attachments Browse links Open downloads Browselinks Share content
  • 19. Workspace Services Profile More diverse app ecosystem Better security and configuration capabilities Requires profile on the device Privacy concerns in BYOD deployments 2 O/SMAM App Container1 Doesn’t require profile installation Ideal for BYOD deployments Limits app ecosystem Requires proprietary SDK STANDALONEMAM Only approved, authorized apps installed in corporate container Organizations can detect jailbroken or rooted devices and take compliance action Separate workand personal apps Stand Alone MAM vs. O/S MAM 19 NATIVEO/SMAM STANDALONEMAM
  • 20. Enterprise Secure Adaptive Management: Productivity Without Compromising Privacy 20 Download Secure App Access All Business Apps Enhanced Security and Experience Workspace ONE for All Use Cases ADAPTIVE MANAGEMENT
  • 21. iOS • Adaptive Management – User can see upfront what features they get by enrolling their device – Privacy notice: to enable the user to see exactly what information is collected by AirWatch – Device management using a limited MDM capabilities • Container Functionality – Support for AirWatch productivity apps without enrollment – Ability to install native public apps from the app store without device management • Kerberos Based SSO for Native Applications 21
  • 22. Android • Adaptive Management – User can see upfront what features they get by enrolling their device. – Privacy notice: to enable the user to see exactly what information is collected by AirWatch. – Device management using Android for Work. • Container Functionality – Support for AirWatch productivity apps without enrollment. – Ability to install native public apps from the app store without device management. • Certificate Based SSO (requires agent, tunnel server and client) – Will require agent with version 2 of the app – Requirement for agent will be removed with version 2.1 – Requirement for tunnel server will be removed in version 2.1 22
  • 23. Windows 10 • Adaptive Management – User can see upfront what features they get by enrolling their device – Privacy notice: to enable the user to see exactly what information is collected by AirWatch – Device management using native MDM for Windows 23
  • 24. Create Compliance Policies for User Groups and Devices 24 App whitelists App blacklists Required apps Current app version Assignment criteria Remediate immediately Send push notifications Uninstall apps Policies Actions
  • 25. Pervasive Security: Datacenter to Device to App Data Center Multi-layered Defense for the Secure Digital Workspace 25 Virtual DesktopDevice Per-app micro-VPN NSX Micro- segmentation + AirWatch Horizon 7
  • 26. VMware NSX for AirWatch 26 Device Level VPN Full Network Access App Level VPN Select Network Access Micro Segmentation with NSX App Level VPN Full Network Access
  • 27. VMware NSX for AirWatch CONFIDENTIAL 27 Advanced security between an AirWatch-managed device and the NSX micro-segmented cloud data center
  • 28. VMware Workspace ONE – an Identity Management Summary Build an App Catalog • Install apps directly onto springboard or access through responsive HTML5 app portal • Auto-Provisioning Workflows Federate User Identity • SSO with Domain Login • Permits Strong Authentication - Provision and revoke access instantly One-Touch Authentication • No configuration or login required • Leverage device ownership and unlock to establish authentication Conditional Access • Managed or Unmanaged devices, Network Scope, Authentication Strength • Set policy levels by app Secure Data on Device • Encrypt and wipe application data using optional AirWatch Mobility Management • Apply Device-based restrictions (cut/copy/camera/GPS/Open in) ✔ ✗
  • 29. Identity and Access Management Unified Catalog Single-Sign On Authentication Access Policy AirWatch Unified EndpointManagement(UEM) Management Context End-User Services Team iOS / MAC ANDROID / CHROME WINDOWS SaaS APPS Unified Endpoint Management - One Platform For All Use Cases Open Ecosystem App Config Community Mobile Security Alliance Authentication and Identity Providers Connected Things (Rugged / IoT) Virtualize
  • 30. Onboard Devices Quickly And Without IT Hassle Configure devices to be automatically configured during initial power ON Corporate Owned Devices Out of Box Enrollment Enable users to activate work services on devices through a simple workflow BYOD End User Self Service
  • 31. • Restrictions • Device layout • Settings access • Notifications • Location services • Bluetooth • Branding • Internal and public apps • Volume purchased apps • Enterprise app catalog • Single sign-on • DLP and security policies • App tunneling • Corporate email • Calendar and contacts • Wi-Fi • VPN • Content repositories • Intranet sites Configure Devices with Apps and Resources Devices Apps Systems
  • 32. Manage Industrial Devices in Modern Framework Industrial • Device staging • Provisioning framework • Multi app launcher • Remote management • Developer tools
  • 33. Gain Visibility Over Peripherals Centrally Deploy • Standardize onboarding Closely Monitor • Asset tracking • Device pairing • Usage and life expectancy Proactively Manage • Alerts and settings • Automated reports
  • 34. Control Device Layout and Manage Apps App Kiosk • Single or Multiple apps • Custom branding • Layout defined • Restricted settings
  • 35. Enable Multiple Employees to Share a Single Device Multiuser • User check-in and out • Custom profile by user • Settings restricted • Custom branding
  • 36. Secure the Endpoint and Prevent Data Loss Encryption Device level encryption Hardware security Biometric integration Passcode Complexity Expiration Device and app Data Sharing permissions Copy / paste Geofencing Watermark Data backups Wi-Fi TLS Siri Always-on VPN Whitelist Blacklist Tethering Settings ConfigurationsCompromised Jailbroken Remote wipe Malware
  • 37. Gain Real-time Insights and Remotely Support Users Dynamic and modular dashboards Detailed and exportable reports Comparative industry analytics Advanced event and device logging Integration to BI tools End user self-serviceportal Remote management and troubleshooting Remote commands and notifications
  • 38. Dynamic Dashboards Based on User Roles HelpdeskAdmin Security Officer App Admin Content & VideoAdmin System Admin Email Admin
  • 39. Multitenant Architecture with Role-based Access Controls
  • 40. Easy Policy Configurations with Industry Templates Configuration Can Be Overwhelming… 100s of devices 1,000s of configurations Millions of apps Industry Templates Simplify device setup with right configurations, apps and policies based on use cases within your industry
  • 41. Intelligently Assign Based on Dynamic Groups Smart Groups Automatically Configures Dynamic Updates SalesforceApp > GlobalSales Team Conference Room App > Only Android v2.0+ APAC EmailServer> All APAC Employees Devices Platform OS and Versions Ownership Model Users Executives Engineering Sales Tags Location History
  • 42. Integrate and Automate with Robust API Framework Allow external systems to invoke core product functionality Enrollment Authentication Admin Users Applications Content Products Tags Device Groups Custom Attribute Device Details Device Profiles Email Smart Groups User Groups Notifications Third Party Solutions (examples) Internal Systems Operations Services Proprietary < extend >
  • 43. Automated Compliance and Remediation Set Rules Define Actions Perform Escalations > > >
  • 44. Customizable Experience for Your Users Branding Console | Apps | Self-Service Portal Globalized Available in 19 Languages
  • 45. Extend Best-in-Class EMM with Critical PC Management Needs Comprehensive unified endpoint management (UEM) features transforming the way IT manages Windows 10 Self-Service Access & SSO Co-exist with Systems Management Deploy Updates Off the Network Device Health Attestation Win32 App Lifecycle Management Instant Push Configuration for Policies GPOs On or Off the Domain Windows Information Protection Patch Auditing Granular Updates Management 5. Client Health & Security 3. OS Patch Management 4. Software Distribution 2. Configuration Management 1. MDM for Windows Asset Tracking Device and OS Lifecycle Management App Managementand Delivery End-to-end Security Management App Inventory BitLocker Encryption Enterprise App Store Imageless Provisioning In-place or custom image migration Modern Management IntelligentInsights and Rules Engine BIOS Management Delivery Optimization Automated Compliance
  • 46. New Windows 10 PC Management Features for Next-Gen PCLM Deploy Patch Configure Apps Windows 10 Provisioning Service for Dell devices ensuring instant productivity Windows Update Analytics & Automation powered by Workspace ONE Intelligence New use cases for hands free management of Dell BIOS Peer Distribution of software for scale, infrastructurereduction and speed © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution© 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Productive User, IT self-service featuresfor peak user and IT experience Reduced Costs silo-less management at reduced TCO Improved Security real-time compliance on any network Mitigates risks; drives productivity and cost savings. Admin GPO and app migration from ConfigMgr/SCCM to AirWatch
  • 47. Windows 10 ProvisioningService for Dell Devices Eliminate manual configuration of PCs and drop-ship straight to user Business Modern deployment solution Employees productive day one IT Eliminate high touch PC setup Respond faster to users in need © 2017 VMware Inc. All rights reserved. Confidential – Not for Distribution Trusted security enable hardware and OS level security at boot Setup at initial boot drop ship PC directly to user; auto configuration upon first booth Auto configure apps, security settings and system policies over the airFactory End userDistributor System Integrator (Staging / Kitting) IT Department Factory End user WithWindows10 ProvisioningService Current Approach Instant Productivity new first launch experience with Workspace ONE 47
  • 48. What are the Issues with the Digital Workspace 48CONFIDENTIAL Data Overload Data Reactive Events Visibility Siloed Visibility Processes Manual Processes
  • 49. Introducing Workspace ONE Intelligence 49CONFIDENTIAL Complete Visibility Proactive Automated Actions ONE Data Lake Workspace ONE Intelligence
  • 50. Workspace ONE Intelligence 50CONFIDENTIAL Enables data driven decisions and actions from a single source of truth Apps Networks Sensors Devices Workspace ONE Intelligence Security Alerts Reports APIs Dashboards Is a new set of capabilities that provide deep insights into the entire digital workspace, enable smart EMM planning and offer powerful automation that together increase security, compliance and user experience across the entire environment.
  • 51. 51CONFIDENTIAL Workspace ONE Intelligence CONFIDENTIAL Rules engine to automate actions Automation Visibility into entire environment Insights Data to make the right decisions Planning Machine learning to predict and remediate anomalies Prediction FUTURE