SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
SierraVMI
Secure Virtual Phone
Virtual Mobile Infrastructure (VMI)
VMI is a service that streams mobile apps
hosted in a data center or the cloud
▪ VMI offers secure access
to mobile apps from any
device or location
Welcome to the new world
Virtual Phones
SierraVMI Deployment
SierraVMI hosting
Android applications
Authentication
Server
Laptop
Tablet
Phone
Moving towards Thin Phones - Hardware
▪ Consumers are adept with thin
devices like Chromebooks
▪ Slow progress in CPU Horse
power and Battery technology is
limiting innovation
▪ Eliminating heavy CPU/GPU
▪ Very low cost <$20
▪ Battery lasting multiple
weeks
▪ Simplified Device Security
Modem
Codec
Thin vOS
Moving towards Thin Phones - Software
▪ FAT OSes like Android are
expensive to maintain and
manage
▪ Addressing security has become
a game of whack-a-mole
▪ Very thin OS
▪ Users are freed from
mundane tasks like OS
upgrades
▪ Can be made in various
form factors
Thin vOS
Thin Phone vs HTML5 Endpoints
▪ Browser is a very CPU,
GPU, Memory intensive
application
▪ Browser based phones,
Chromebooks etc. still
require expensive internals
(SOC, Memory etc)
▪ Not as battery efficient as
Sierraware vPhones
▪ Cant run feature rich
3D/2D games
▪ No Software required
on the client device.
Eliminating security
vulnerabilities.
▪ Universal solution
addressing gaming
consumer to Military
grade security
conscious users
▪ Power of Cloud. Can
delivery any kind apps
with ease.
HTML5 Thin clients VMI Virtual Phone
SierraVMI Keeps Business Data Safe
SierraVMI Shields
Mobile Data
4096-bit ECDHE
Encryption
Dual factor
authentication
SierraVMI:
• Records mobile app access
• Stores app data securely in the data center
• IT can centrally upgrade mobile apps
End user
VMI and eSIM/Programmable SIM
▪ Availability of Programmable SIMs/eSIM have
dramatically changed the landscape for virtual phones
▪ Several studies are showing the increasing adoption of
Virtual SIM
– http://www.mckinsey.com/industries/telecommunications/our-insights/e-sim-
for-consumers-a-game-changer-in-mobile-telecommunications
– www.pcmag.com/news/352069/hands-on-farewell-sim-cards-hello-virtual-sims
▪ Products are readily available from various Tier1
Vendors.
– http://technews.co/2015/03/25/xiaomis-miui-now-features-
virtual-sim-card-for-overseas-travels/
– https://www.apple.com/uk/ipad/apple-sim/
Mobile security - Evolved
MAM/Containers
▪ Proved in-efficient
▪ Required app modification
▪ Dependent on OS security
▪ Expensive to maintain
▪ Requires enterprises to restrict the
type of physical devices
In-secure phone
Container
App1
App2
OS Virtualization
▪ Requires hardware tie-in
▪ Phones are not readily available
▪ OEM/Provider must work with
Virtualization vendor to port
▪ Expensive to deploy and maintain
▪ Not suitable for wider deployment
Hypervisor
User OS
Enterprise
OS
Virtual Enterprise Phone
– Very low cost
– No hardware tie in
– Universal access
– Simplified cloud
management
App1
App 2
App1
VMI Cloud
App2
Edge
computing can
offer smooth
and reliable
vPhone service
Comprehensive
security by
controlling
both primary
and vPhone
access
Mobile Network Operator - Advantage
Security is not
tied to the
primary phone.
Allowing users
to easily
upgrade.
Adding
services
beyond data &
voice can be a
differentiator
Ecosystem of Users’ Devices
▪ One contract for all devices
simplifies contract setup and
maintenance for customers
▪ Centralized management
allows customers to manage
device-specific settings.
Value for Customers
▪ Improved customer loyalty by addressing customer needs and improving
experience
▪ Reduced customer turnover due to barriers of switching mobile operators
– Customers would need to change SIM profiles on all devices and lose
management features
Benefits
Help Customers Manage All their Devices
More Devices – Driving Innovation
▪ Wearables, IoT and other connected devices are pushing the
Cost down aggressively
▪ OEMs are delivering eSIMs rapidly
▪ Offering differentiation is more Important than ever
– Depending on quality and coverage has minimal impact on purchase
decisions
– Lowering the cost of service severely impacts profitability
– Customers are willing to pay for premium services as proven by various
other subscription services in music and movies.
– Ease of Use, Always available are more important in todays word than ever
More Opportunities - Expanding Word
▪ More Players are joining the Virtual Access
Market place
▪ Developers are facing huge hurdles in reaching
devices of Various kinds and technologies
▪ Vast un-tapped potential for carries to help
both device makers and developers
Impact of Virtual Phones and eSIM
▪ Simplified Logistics
▪ Lower cost of customer acquisition
▪ Zero overhead in delivery and retail presence
▪ Always available and Preferred consumer model
– Customers have adapted to streaming model of delivery
– No per device contracts
– Simplified remote management. Preferred by Enterprises and
high net worth customers
– Unlimited Storage
What do customers expect ?
▪ Privacy:
– Trusted service provider to ensure that their data and profile is safe
– Ability to protect personal information from MDM and other intrusive systems
▪ 24x7 Access. Availability
– Instant access to apps, irrespective of storage size, version upgrades etc.
– Ability to access from any device. Home Personal Assistants like Amazon Echo,
Wearables, Phones etc.
▪ Just Freedom.
– Use any where across the world. Work place, home any where and any device with no restrictions
– Worries about OS version, Patches, Vulnerabilities
– Cost associated with phone storage sizes, app compatibility
Wireless
Carrier
Firewall
Service Provider Deployment - VMI
Carrier
Billing
System
SierraVMI
▪ Easy deployment with integrated high availability
▪ Integration with enterprises’ and service providers’ existing
authentication, directory services, and management systems
– Granular user, group and domain-level policies
Consumer
Enterprise User
Gamer
Email
Social
Media
Games
VPN
Authentication Servers
and Corporate Data
Enterprise
XML APIs
Universal Access
• Android, iOS, Microsoft hololens, Windows10 PC, Windows Mobile,
Android Wear, Android TV, Ubuntu Linux PC and many more.
• Among all remote access vendors, SierraVMI provides the widest
range of client device
• 24x7 Alerts from Email or from applications like Skype and other
Messengers
Before VMI With VMI
▪ Companies rely on heavy-handed
MDM features like remote wipe
to prevent data loss
▪ Each app has different encryption
and authentication capabilities
▪ Limited ability to monitor mobile
user access to business apps
▪ Remote VPN access to network
resources difficult to restrict or
audit
▪ Companies must develop mobile
apps for iOS, Android, Windows
Phone, Blackberry
▪ Data is never downloaded to
mobile devices
▪ All apps support multi-factor
auth, strong encryption & SSO
▪ Optional logging and video
recording of privileged users
▪ Granular control and monitoring
of remote access from mobile
apps
▪ Companies can develop an app
for Android and support all
devices
The End
www.sierraware.com

Contenu connexe

Tendances

[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)Andrea Colombetti
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung Biz Mobile
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 
Digital signage Malaysia
Digital signage MalaysiaDigital signage Malaysia
Digital signage MalaysiaNajib Habeb
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test BedCellnetrix
 
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Century Software, Inc.
 
Eagle Eye Networks, Cloud Video Surveillance
Eagle Eye Networks, Cloud Video SurveillanceEagle Eye Networks, Cloud Video Surveillance
Eagle Eye Networks, Cloud Video SurveillanceEagleeyenetworks
 
KFC Self Service Terminal
KFC Self Service TerminalKFC Self Service Terminal
KFC Self Service TerminalDony Riyanto
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP camHermesDDS
 

Tendances (20)

Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)OmniSource_ppt_2011_7-2 (2)(1)
OmniSource_ppt_2011_7-2 (2)(1)
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 
Digital signage Malaysia
Digital signage MalaysiaDigital signage Malaysia
Digital signage Malaysia
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
IoT eSIM Test Bed
IoT eSIM Test BedIoT eSIM Test Bed
IoT eSIM Test Bed
 
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
Best-of-Breed Terminal Emulation for iOS & Android Mobile devices.
 
Eagle Eye Networks, Cloud Video Surveillance
Eagle Eye Networks, Cloud Video SurveillanceEagle Eye Networks, Cloud Video Surveillance
Eagle Eye Networks, Cloud Video Surveillance
 
KFC Self Service Terminal
KFC Self Service TerminalKFC Self Service Terminal
KFC Self Service Terminal
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 

Similaire à Sierraware virtual phone

Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIMJT IoT
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueDan Mårtensson
 
New Business Opportunities: Small Cells and Wholesale DAS
New Business Opportunities: Small Cells and Wholesale DAS  New Business Opportunities: Small Cells and Wholesale DAS
New Business Opportunities: Small Cells and Wholesale DAS Ilissa Miller
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustRivetz
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies
 
Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Wiecher Akkerman
 
Data sheet - BT smartnumbers mobile for good
Data sheet - BT smartnumbers mobile for goodData sheet - BT smartnumbers mobile for good
Data sheet - BT smartnumbers mobile for goodmParticle
 
Identifying Bottlenecks in Mobile Cloud Computing (MCC)
Identifying Bottlenecks in Mobile Cloud Computing (MCC)Identifying Bottlenecks in Mobile Cloud Computing (MCC)
Identifying Bottlenecks in Mobile Cloud Computing (MCC)Dr. Ranbijay Kumar
 
Signal distribution in ds networks
Signal distribution in ds networksSignal distribution in ds networks
Signal distribution in ds networksElizabeta Petakovic
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...drctan
 

Similaire à Sierraware virtual phone (20)

Eseye
Eseye Eseye
Eseye
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Learnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business valueLearnings of how to simplifying io t solutions and securing business value
Learnings of how to simplifying io t solutions and securing business value
 
New Business Opportunities: Small Cells and Wholesale DAS
New Business Opportunities: Small Cells and Wholesale DAS  New Business Opportunities: Small Cells and Wholesale DAS
New Business Opportunities: Small Cells and Wholesale DAS
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Myers Network Solution presents: VoIP
Myers Network Solution presents: VoIPMyers Network Solution presents: VoIP
Myers Network Solution presents: VoIP
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
Mobility solutions with shore tel v1
Mobility solutions with shore tel v1Mobility solutions with shore tel v1
Mobility solutions with shore tel v1
 
Data sheet - BT smartnumbers mobile for good
Data sheet - BT smartnumbers mobile for goodData sheet - BT smartnumbers mobile for good
Data sheet - BT smartnumbers mobile for good
 
Identifying Bottlenecks in Mobile Cloud Computing (MCC)
Identifying Bottlenecks in Mobile Cloud Computing (MCC)Identifying Bottlenecks in Mobile Cloud Computing (MCC)
Identifying Bottlenecks in Mobile Cloud Computing (MCC)
 
Signal distribution in ds networks
Signal distribution in ds networksSignal distribution in ds networks
Signal distribution in ds networks
 
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...From E-Transactions to M-Transactions: Enabling mobile transactions with info...
From E-Transactions to M-Transactions: Enabling mobile transactions with info...
 

Plus de Sierraware

Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 

Plus de Sierraware (7)

Cloud gaming
Cloud gamingCloud gaming
Cloud gaming
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 

Dernier

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Dernier (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

Sierraware virtual phone

  • 2. Virtual Mobile Infrastructure (VMI) VMI is a service that streams mobile apps hosted in a data center or the cloud ▪ VMI offers secure access to mobile apps from any device or location
  • 3. Welcome to the new world Virtual Phones
  • 4. SierraVMI Deployment SierraVMI hosting Android applications Authentication Server Laptop Tablet Phone
  • 5. Moving towards Thin Phones - Hardware ▪ Consumers are adept with thin devices like Chromebooks ▪ Slow progress in CPU Horse power and Battery technology is limiting innovation ▪ Eliminating heavy CPU/GPU ▪ Very low cost <$20 ▪ Battery lasting multiple weeks ▪ Simplified Device Security Modem Codec Thin vOS
  • 6. Moving towards Thin Phones - Software ▪ FAT OSes like Android are expensive to maintain and manage ▪ Addressing security has become a game of whack-a-mole ▪ Very thin OS ▪ Users are freed from mundane tasks like OS upgrades ▪ Can be made in various form factors Thin vOS
  • 7. Thin Phone vs HTML5 Endpoints ▪ Browser is a very CPU, GPU, Memory intensive application ▪ Browser based phones, Chromebooks etc. still require expensive internals (SOC, Memory etc) ▪ Not as battery efficient as Sierraware vPhones ▪ Cant run feature rich 3D/2D games ▪ No Software required on the client device. Eliminating security vulnerabilities. ▪ Universal solution addressing gaming consumer to Military grade security conscious users ▪ Power of Cloud. Can delivery any kind apps with ease. HTML5 Thin clients VMI Virtual Phone
  • 8. SierraVMI Keeps Business Data Safe SierraVMI Shields Mobile Data 4096-bit ECDHE Encryption Dual factor authentication SierraVMI: • Records mobile app access • Stores app data securely in the data center • IT can centrally upgrade mobile apps End user
  • 9. VMI and eSIM/Programmable SIM ▪ Availability of Programmable SIMs/eSIM have dramatically changed the landscape for virtual phones ▪ Several studies are showing the increasing adoption of Virtual SIM – http://www.mckinsey.com/industries/telecommunications/our-insights/e-sim- for-consumers-a-game-changer-in-mobile-telecommunications – www.pcmag.com/news/352069/hands-on-farewell-sim-cards-hello-virtual-sims ▪ Products are readily available from various Tier1 Vendors. – http://technews.co/2015/03/25/xiaomis-miui-now-features- virtual-sim-card-for-overseas-travels/ – https://www.apple.com/uk/ipad/apple-sim/
  • 10. Mobile security - Evolved MAM/Containers ▪ Proved in-efficient ▪ Required app modification ▪ Dependent on OS security ▪ Expensive to maintain ▪ Requires enterprises to restrict the type of physical devices In-secure phone Container App1 App2 OS Virtualization ▪ Requires hardware tie-in ▪ Phones are not readily available ▪ OEM/Provider must work with Virtualization vendor to port ▪ Expensive to deploy and maintain ▪ Not suitable for wider deployment Hypervisor User OS Enterprise OS Virtual Enterprise Phone – Very low cost – No hardware tie in – Universal access – Simplified cloud management App1 App 2 App1 VMI Cloud App2
  • 11. Edge computing can offer smooth and reliable vPhone service Comprehensive security by controlling both primary and vPhone access Mobile Network Operator - Advantage Security is not tied to the primary phone. Allowing users to easily upgrade. Adding services beyond data & voice can be a differentiator
  • 12. Ecosystem of Users’ Devices ▪ One contract for all devices simplifies contract setup and maintenance for customers ▪ Centralized management allows customers to manage device-specific settings. Value for Customers ▪ Improved customer loyalty by addressing customer needs and improving experience ▪ Reduced customer turnover due to barriers of switching mobile operators – Customers would need to change SIM profiles on all devices and lose management features Benefits Help Customers Manage All their Devices
  • 13. More Devices – Driving Innovation ▪ Wearables, IoT and other connected devices are pushing the Cost down aggressively ▪ OEMs are delivering eSIMs rapidly ▪ Offering differentiation is more Important than ever – Depending on quality and coverage has minimal impact on purchase decisions – Lowering the cost of service severely impacts profitability – Customers are willing to pay for premium services as proven by various other subscription services in music and movies. – Ease of Use, Always available are more important in todays word than ever
  • 14. More Opportunities - Expanding Word ▪ More Players are joining the Virtual Access Market place ▪ Developers are facing huge hurdles in reaching devices of Various kinds and technologies ▪ Vast un-tapped potential for carries to help both device makers and developers
  • 15. Impact of Virtual Phones and eSIM ▪ Simplified Logistics ▪ Lower cost of customer acquisition ▪ Zero overhead in delivery and retail presence ▪ Always available and Preferred consumer model – Customers have adapted to streaming model of delivery – No per device contracts – Simplified remote management. Preferred by Enterprises and high net worth customers – Unlimited Storage
  • 16. What do customers expect ? ▪ Privacy: – Trusted service provider to ensure that their data and profile is safe – Ability to protect personal information from MDM and other intrusive systems ▪ 24x7 Access. Availability – Instant access to apps, irrespective of storage size, version upgrades etc. – Ability to access from any device. Home Personal Assistants like Amazon Echo, Wearables, Phones etc. ▪ Just Freedom. – Use any where across the world. Work place, home any where and any device with no restrictions – Worries about OS version, Patches, Vulnerabilities – Cost associated with phone storage sizes, app compatibility
  • 17. Wireless Carrier Firewall Service Provider Deployment - VMI Carrier Billing System SierraVMI ▪ Easy deployment with integrated high availability ▪ Integration with enterprises’ and service providers’ existing authentication, directory services, and management systems – Granular user, group and domain-level policies Consumer Enterprise User Gamer Email Social Media Games VPN Authentication Servers and Corporate Data Enterprise XML APIs
  • 18. Universal Access • Android, iOS, Microsoft hololens, Windows10 PC, Windows Mobile, Android Wear, Android TV, Ubuntu Linux PC and many more. • Among all remote access vendors, SierraVMI provides the widest range of client device • 24x7 Alerts from Email or from applications like Skype and other Messengers
  • 19. Before VMI With VMI ▪ Companies rely on heavy-handed MDM features like remote wipe to prevent data loss ▪ Each app has different encryption and authentication capabilities ▪ Limited ability to monitor mobile user access to business apps ▪ Remote VPN access to network resources difficult to restrict or audit ▪ Companies must develop mobile apps for iOS, Android, Windows Phone, Blackberry ▪ Data is never downloaded to mobile devices ▪ All apps support multi-factor auth, strong encryption & SSO ▪ Optional logging and video recording of privileged users ▪ Granular control and monitoring of remote access from mobile apps ▪ Companies can develop an app for Android and support all devices