SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Mobile App Virtualization
101
BYOD
has forced IT departments
to change the way that
they manage and secure
applications and devices.
Due to BYOD, IT must:
 Provision and maintain mobile apps
 Support phones and tablets from
different manufacturers
 Protect business data on mobile devices
Virtual Mobile Infrastructure (VMI)
helps solve BYOD challenges by allowing
users to access mobile apps that are hosted
in remote data centers—so sensitive data is
never stored on mobile devices.
Virtual Mobile
Infrastructure
VMI empowers organizations to:
 Develops apps once and support any device
 Centralize mobile app management
 Detect unauthorized access or data loss
 Enforce strong authentication and encryption
Not all VMI solutions are equal.
Mobile App Virtualization
offers better session density than
other VMI solutions. It can run
multiple, isolated user instances on
a single Android operating system.
64-bit Android
Multi User Extensions
User 1
User 3
User 2
HW Offload Engines
Because mobile app virtualization does not need to run
a separate Android VM per user, it delivers 8 to 10x
better density compared to full OS virtualization1
Android
VM 1
Android
VM n
Mobile App Virtualization Full OS Virtualization
Hypervisor
1 Density estimate based on a 16 MB mobile app running on a 1 GB Android system.
Mobile app virtualization
requires fewer servers, so
it lowers hardware and
operating costs.
The cost savings are even greater
in the cloud. Organizations can
rent one VM for hundreds of
users rather per user.
Mobile app virtualization:
 Accelerates app “boot up time”
 Reduces storage requirements
 Processes input events and images at
the app level to maximize performance
 64-bit Android VM needs more than 2GB of RAM
 More VMs will require
• Large data center with higher power and cooling costs
• Complex IT management
• Expensive external storage solution
• Additional VM management solution like OpenStack
 Most VMI solutions require professional services
• Not a drop in solution
• High initial setup cost and time
Cost and Scalability of Alternative Approaches
Android VM
App App
Display
Audio
Input
Simple Doesn’t Scale…
XEN/KVM - HYP
Base Linux or DOM0 Linux
QEMU – Emulation
X-Win
VMI Remote Protocol
 QEMU overhead is substantial.
 All devices such as display are emulated.
 The amount of traffic between VM and
host will be enormous. A 1080p emulated
device will consume 2 Xeon cores.
10+ Gbs
Display Audio Touch
Capturing Encrypted Data
Multi-User Android Runtime
Secure Container
Secure
SSL Proxy
File Scanner
Secure I/O Monitor
for Keystroke & Video
App Behavior Scanner
Network Scanner
Mobile App Virtualization: Security
 Centralized storage of data
– Prevents data loss from device theft
 Centralized patch management
– Eliminates concerns about devices with
vulnerable or unpatched software
 Optional user monitoring
– Records sessions for forensics
Monitor User and Application Activity
 Dashboard of
system status
 Detailed logs of
user activity
 Ability to record
full user session
 Geo-tracking
Mobile App Virtualization Architecture
VMI Security
Gateway Clients
Authentication
Server
Benefits
 Very high density
 Apps can share resources like GPU
 Easy to manage
 No need for expensive storage
Considerations
 Cannot define hardware
resources per session
64-bit Android
Multi User Extensions
User 1
User 3
User 2
HW Offload
Engines
Reasons to Consider Mobile App Virtualization
Low Hardware Costs
High User Density
Streamlined Management
in the Cloud
Accelerated Boot Up Time and
Responsive User Interface
Try Mobile App Virtualization at www.sierraware.com/demo

Contenu connexe

Tendances

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSteven Cull
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentationratneshsinghparihar
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their DesksGen-i
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 

Tendances (20)

Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Knox Manage Tech Sheet
Knox Manage Tech SheetKnox Manage Tech Sheet
Knox Manage Tech Sheet
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM Solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Mobile Device Management Guide
Mobile Device Management GuideMobile Device Management Guide
Mobile Device Management Guide
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Mobile device management presentation
Mobile device management presentationMobile device management presentation
Mobile device management presentation
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their Desks
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 

Similaire à Mobile App Virtualization 101

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance WebinarGrafic.guru
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationHTS Hosting
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Flexthink2016_IIOT_Vision
Flexthink2016_IIOT_VisionFlexthink2016_IIOT_Vision
Flexthink2016_IIOT_VisionYvan Rudzinski
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009MobileWorxs
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Serviceksholes
 
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVirtual Computer
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent MonitoringOnomi
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 

Similaire à Mobile App Virtualization 101 (20)

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Hypori Performance Webinar
Hypori Performance WebinarHypori Performance Webinar
Hypori Performance Webinar
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Flexthink2016_IIOT_Vision
Flexthink2016_IIOT_VisionFlexthink2016_IIOT_Vision
Flexthink2016_IIOT_Vision
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
VBOT
VBOTVBOT
VBOT
 
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Interoute Intelligent Monitoring
Interoute Intelligent MonitoringInteroute Intelligent Monitoring
Interoute Intelligent Monitoring
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 

Dernier

Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesSoftwareMill
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadIvo Andreev
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Jaydeep Chhasatia
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfBrain Inventory
 

Dernier (20)

Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 
Growing Oxen: channel operators and retries
Growing Oxen: channel operators and retriesGrowing Oxen: channel operators and retries
Growing Oxen: channel operators and retries
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Cybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and BadCybersecurity Challenges with Generative AI - for Good and Bad
Cybersecurity Challenges with Generative AI - for Good and Bad
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
Optimizing Business Potential: A Guide to Outsourcing Engineering Services in...
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdf
 

Mobile App Virtualization 101

  • 2. BYOD has forced IT departments to change the way that they manage and secure applications and devices.
  • 3. Due to BYOD, IT must:  Provision and maintain mobile apps  Support phones and tablets from different manufacturers  Protect business data on mobile devices
  • 4. Virtual Mobile Infrastructure (VMI) helps solve BYOD challenges by allowing users to access mobile apps that are hosted in remote data centers—so sensitive data is never stored on mobile devices. Virtual Mobile Infrastructure
  • 5. VMI empowers organizations to:  Develops apps once and support any device  Centralize mobile app management  Detect unauthorized access or data loss  Enforce strong authentication and encryption
  • 6. Not all VMI solutions are equal. Mobile App Virtualization offers better session density than other VMI solutions. It can run multiple, isolated user instances on a single Android operating system.
  • 7. 64-bit Android Multi User Extensions User 1 User 3 User 2 HW Offload Engines Because mobile app virtualization does not need to run a separate Android VM per user, it delivers 8 to 10x better density compared to full OS virtualization1 Android VM 1 Android VM n Mobile App Virtualization Full OS Virtualization Hypervisor 1 Density estimate based on a 16 MB mobile app running on a 1 GB Android system.
  • 8. Mobile app virtualization requires fewer servers, so it lowers hardware and operating costs.
  • 9. The cost savings are even greater in the cloud. Organizations can rent one VM for hundreds of users rather per user.
  • 10. Mobile app virtualization:  Accelerates app “boot up time”  Reduces storage requirements  Processes input events and images at the app level to maximize performance
  • 11.  64-bit Android VM needs more than 2GB of RAM  More VMs will require • Large data center with higher power and cooling costs • Complex IT management • Expensive external storage solution • Additional VM management solution like OpenStack  Most VMI solutions require professional services • Not a drop in solution • High initial setup cost and time Cost and Scalability of Alternative Approaches
  • 12. Android VM App App Display Audio Input Simple Doesn’t Scale… XEN/KVM - HYP Base Linux or DOM0 Linux QEMU – Emulation X-Win VMI Remote Protocol  QEMU overhead is substantial.  All devices such as display are emulated.  The amount of traffic between VM and host will be enormous. A 1080p emulated device will consume 2 Xeon cores. 10+ Gbs Display Audio Touch
  • 13. Capturing Encrypted Data Multi-User Android Runtime Secure Container Secure SSL Proxy File Scanner Secure I/O Monitor for Keystroke & Video App Behavior Scanner Network Scanner
  • 14. Mobile App Virtualization: Security  Centralized storage of data – Prevents data loss from device theft  Centralized patch management – Eliminates concerns about devices with vulnerable or unpatched software  Optional user monitoring – Records sessions for forensics
  • 15. Monitor User and Application Activity  Dashboard of system status  Detailed logs of user activity  Ability to record full user session  Geo-tracking
  • 16. Mobile App Virtualization Architecture VMI Security Gateway Clients Authentication Server Benefits  Very high density  Apps can share resources like GPU  Easy to manage  No need for expensive storage Considerations  Cannot define hardware resources per session 64-bit Android Multi User Extensions User 1 User 3 User 2 HW Offload Engines
  • 17. Reasons to Consider Mobile App Virtualization Low Hardware Costs High User Density Streamlined Management in the Cloud Accelerated Boot Up Time and Responsive User Interface
  • 18. Try Mobile App Virtualization at www.sierraware.com/demo