advaiya enterprise mobility whitepaper
DESCRIPTION
This paper discusses trends and challenges affecting enterprise mobility and how organizations can effectively build and deploy around enterprise mobility frameworkTRANSCRIPT
Enterprise Mobility
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Contents
Introduction ........................................................................................................................................................... 1
Trends, Challenges, and Drivers........................................................................................................................... 2
Enterprise Mobility Maturity and Optimization Framework ............................................................................ 4
Key Mobility Considerations and Vendor Characteristics ................................................................................. 6
Conclusion............................................................................................................................................................ 12
References ............................................................................................................................................................ 13
Glossary ................................................................................................................................................................ 15
Enterprise Mobility
Page i Advaiya Solutions Pvt. Ltd.
Introduction
IT grapples with the need to extend enterprise architecture to include mobility considerations
making personal devices as business tools. Mobile devices bring enterprise data to new roles,
supporting a seamless mobile experience. Businesses pursue opportunities to stay ahead of
the competition, providing users with secure and compliant information, anytime and
anywhere on mobile infrastructure. The primary research of current landscape of mobile
solutions for varying business needs provided with the mobility optimization framework and
considerations for mobile app management.
Various analyst firms and IT firms including IDC, Gartner, Aberdeen, Intel etc. have carried our
researches and conducted surveys on Enterprise Mobility. In one such study, Gartner observed
that consumerization and the ubiquity of connected smart devices, people's behavior has
caused a convergence of these forces. A Nexus of converging forces — social, mobile, cloud and
information — is building upon and transforming user behavior while creating new business
opportunities. Mobile computing is forcing the biggest change to the way work. It changes how
they spend their day. Mass adoption forces new infrastructure. It spawns new businesses. And it
threatens the status quo1. The innovation rate in mobile devices, social software and cloud
computing is accelerating faster than the enterprise adaptation rate. IT organizations that fail to
adapt to this new reality will lose their relevance in the era of pervasive mobility. 2
With this comes the responsibility for Businesses to consider mobility management as
important as datacenter management. This is the core premise of study – that enterprise
mobility management deals with Mobile Strategy and Roadmap, Mobile Device Management,
Mobile Device Security, Mobile Device Policy, Enterprise Application Enablement, Mobile App
Management. We have studied mobility trends and studies from various analysts, mobility
solutions of leader vendors and developed Enterprise Mobility framework with three maturity
levels (Mobile aware, Mobile enabled, Mobile enterprise) of these capabilities through which
organizations can advance with a strategic roadmap and accrue measurable business value.3
This paper discusses trends and challenges affecting enterprise mobility and how
organizations can effectively build and deploy around enterprise mobility framework
1 Gartner, The Nexus of Forces: Foundational Research for the Technical Professional, June 2012,
http://www.gartner.com/technology/research/technical-professionals/ne xus-of-forces.jsp
2 Gartner, Enterprise Mobility and Its Impact on IT, April 2012, http://www.gartner.com/technology/research/technical-professionals/m obility.jsp
3 Aberdeen Group, Enterprise Mobility Management 2012, April 2012,
http://content.maas360.com/www/content/ar/Aberdeen_SoMoClo_2012.pdf
Analyzing mobility infrastructure
and architecture helps enterprise
to quickly assess the technology
landscape, current trends and
make company data available in
real time with device support
across various platforms.
Enterprise Mobility
Page ii Advaiya Solutions Pvt. Ltd.
Trends, Challenges, and Drivers
In today’s changing markets, enterprises face several challenges in creating an enterprise mobility strategy. The challenge is not building
mobile application but providing mobile application platform. They need to slowly move up the maturity curve in adopting mobi lity.
Trends
70% of mobile professionals will conduct their work on personal smart devices by 20184
BYOC is attracting interest from organizations that look to reduce IT costs and satisfy user demands for device choice, While "bring
your own computer" removes some of IT's desktop management responsibility, IT must make additional management investments
to make it work.5
Enterprise tablet adoption will grow by 50 percent annually. In addition, 71 percent of workers surveyed use tablets as an additional
device rather than a computer replacement6
More than 40 percent of all enterprise web applications will have mobile apps by 2014, and 90 percent of companies will support
corporate apps on mobile devices by 20147
Expect MDM to fade from marketing language in 2013, replaced by MAM (mobile application management) or MEM (mobile
enterprise management).8
2013 will bring a lot more integration between mobile apps and the cloud. Wherever possible, you won't have data that resides on
the device.9
Security, manageability, and remote wipe capabilities are top requirements for a successful BYOD program10
Drivers11
4 Gartner, Bring Your Own Device, 2013
http://www.gartner.com/technology/topics/byod. jsp 5 Gartner, The Impact of BYOC on Management and Support, October 2011
http://www.gartner.com/id=1820215 6 ClickSoftware.com, 2013
http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 7 Gartner, 2013
http://www.retalix.com/blog/5-enterprise-mobility-trends-watch-2013/ 8 Information Week, 2013
http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-pre dict ions-for-20/240145435 9 451 Research – Hazelton, 2013
http://www.informationweek.com/mobility/smart-phones/7-enterprise-mobility-pre dict ions-for-20/240145435?pgno=2 10 Intel, Insights on the Current State of BYOD, October 2012
http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/consumerization-enterprise-byod-peer-research-paper.pdf 11 Cognizant, F orces Driving Enterprise Mobility http://www.cognizant.com/insights/perspectives/forces-driving-enterprise-mobility
Support flexible
workstyle to drive employee
satisfaction
Enhancing remote productivity
Increased Use of Mobility by Consumers
Enterprise Mobility
Page iii Advaiya Solutions Pvt. Ltd.
Challenges 12
12 IQT, The Challenges of Enterprise Mobility
http://www.iqt.org/portfolio/on-our-ra dar/Enterprise_mobility.pdf
Securing corporate Information
systems with increase in offsite work through
personal devices
Integrating mobile apps with
enterprise systems
Supporting variety
of mobile devices and rapidly changing mobile
technology
Managing what’s on the mobile
device
Enterprise Mobility
Page iv Advaiya Solutions Pvt. Ltd.
Enterprise Mobility Maturity and Optimization Framework
Optimization is a structured, systematic process of assessing mobile infrastructure and architecture maturity across IT and Business
world. The process begins with where the mobility infrastructure is and where the enterprise wants it to be. Enterprise mobility
framework defines 3 maturity phases as Mobile Aware, Mobile Enabled and Mobile Enterprise. The Enterprise Mobility Maturity Model
capabilities, maturity definitions and features are illustrated below.
Capability Mobile Aware Mobile Enabled Mobile Enterprise
Mobile Strategy and
Roadmap
Agreed upon strategic
direction, no mobile strategy
roadmap
Strategy published and
communicated, bottom-
up driven roadmap
Mobile strategy drives the
mobility roadmap, measured
results feed the strategy
Mobile Device Management Limited platform specific
management
Platform specific,
comprehensive device
management
Centrally managed, policy driven,
integrated device management
Features Web based authentication
Corporate device provisioning by IT
Certificates, passcodes, multifactor authentication, single sign-on to apps and data
Device enrollment through web-portal, e-mail, over-the-air using smartphones/tablets
application, or SMS with OTP authentication.
Central policy management system for endpoint devices
Predictive analytics, proactive alerting, real-time diagnostics and problem resolution
Remote support and troubleshooting including VOIP and chat
AD/LDAP based authentication
Personal device provisioning and self-service enrollment
Management console with strong dashboard and detailed reporting capabilities (role-based
views)
Mobile Device Security Limited platform specific device
security
Cross platform mobile
device security
Fully managed cross platform
mobile device security
Features Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,
context-aware policies, app blacklist/whitelist
Rooting and jailbreak detection, pre-enrollment device checks, geo-fencing and tracking,
context-aware policies, app blacklist/whitelist
Encryption policy (phone, SD)
Lockdown security (camera, SD, Bluetooth, Wi-Fi)
Password enforcement
Remote lock and wipe
Mobile
Aware
Unmanaged user devices used in the organization in limitied capacity
Use of pilot application
Mobile
Enabled
Partially managed devices connect to limited company resources
Handful of mobile applications
Mobile
Enterprise
Fully managed employees and company devices participate in enterprise
workflow
1 2 3
Enterprise Mobility
Page v Advaiya Solutions Pvt. Ltd.
App inventory, distribution
Real-time, permission-based remote control
Enterprise data boundary with selective wipe and privacy policies
Access Control (Sentry) with ActiveSync connection activity, device visibility and blocking of
email access
Certificate distribution
Secure administration with role-based access, group-based actions and persistent logs and
audit trails
Lost phone recovery (locate and map)
Mobile Device Policy Platform specific mobile device
policy
Established cross platform
device policies
Fully defined & enforced mobile
device policies across all devices
Features Web content filtering and URL filtering on mobile devices
Mobile policies based on OS and patch levels, passcodes, device ownership, apps and device
resources, platform-specific policies, encryption, device status and location
Quarantine noncompliant devices based on policies, devices, operating system versions, and
compliance violation
Enterprise Application
Enablement
Limited enablement of select
enterprise functions
Key enterprise functions
and processes are mobile
enabled
Mobility enables business
process innovation
Features Embedded VPN and sandbox that can control and encrypt application traffic.
App wrapping to import mobile apps
Enables smartphone/tablet users to subscribe to enterprise document and database updates
through the enterprise application distribution function
SMS Integration with other services/Applications using APIs
Application authorization even on platforms that do not support blacklisting /whitelisting
Mobile App Management Unmanaged mobile Apps Unmanaged commercial
and managed custom
mobile apps
Fully managed mobile business
apps portfolio
Features Enterprise App Catalogues
Advanced distribution rules selecting eligible devices based on both inclusion and exclusion
criteria
Push updated versions automatically for on-demand apps
On-demand installation using app catalog
Public Appstore integration
Prevent data backup and automatically remove apps on un-enrollment
Track and view installed/approved/blacklisted applications at the device/user level
Remotely manage application settings on supported apps through Application Profiles
Container approach to separate personal versus corporate data
Secure business apps and data with encryption and mobile DLP technologies
Granular policy-based management and access controls
Overall Unmanaged consumer mobile
devices used in organization
in limited capacity
Partially managed
devices connect to
limited company
resources
Fully managed company and
employee devices participate
in enterprise workflow
Enterprise Mobility
Page vi Advaiya Solutions Pvt. Ltd.
Key Mobility Considerations and Vendor Characteristics
There are three leading platforms in the mobile segment—smartphones, tablets, and notebooks PCs - and new In-Stat (www.in-
stat.com) research forecasts that this category of mobile “magnet platforms” will grow at a CAGR of 25.7% through 2015 as com pared
to 8.7% for the overall mobile market.
Employees use smartphones, tablets or personal devices at workplaces to access corporate networks, business applications and data to
maximize connectivity and productivity. This demands for the need of secure and compliant access to applications and data on various
mobile platforms.
The mobility landscape in India is rapidly evolving. Enterprises are embracing mobility to improve work productivity and experience of
customers.13
The research lays emphasis on the essentials of enterprise mobility and its integration i.e. Mobile Device Management, Contro lled
Services Exposure, SMS based Service Invocation, Enterprise Mobility Gateway and Business Service Interface.
14Mobile Device Management: Mobile device management (MDM) solutions help enterprises manage smartphones and tablets by
providing centralized, multivendor device management that results in lower risk and improved cost of ownership. Although the MDM
market is fragmented with point solutions, it is evolving toward broader solutions that will eventually support application, security,
policy, and device and service management. Important MDM features that enterprises need to consider:
Device Registration/De-registration
Bring Your Own Device
Authentication Methods
Vendor Characteristics
Enterasys Mobile IAM
13 NASSCOM, Mobility on the Move in India, Zinnov Managemen Consulting
http://www.nasscom.org/mobility-move-india?fg=162893 14 Gartner, Mobile Device Management Evaluation Criteria, January 2012
http://www.gartner.com/DisplayDocument?docC ode =217549&ref=g_fromdoc
Key Trends
ERP, CRM, SCM, along with email solutions
expected to fuel the growth of the mobility
market Application maturity increase from the
current dashboarding level to complete back-end integration
Declining mobility solutions costs are enabling SMBs to join the enterprise
mobility bandwagon
India’s mobility landscape:
840 million active mobiles operational
15% of smartphone market share
About 15 million mobile subscribers added every month
Laptop market is growing at a CAGR of 50 per cent
PC penetration in urban households have reached 38 per cent
There is an installed base of 25 million computers in India
Enterprise Mobility
Page vii Advaiya Solutions Pvt. Ltd.
Simplified onboarding and provisioning
Secure, IT controlled BYOD solution with predictable network experience
Web based registration, Kerberos Snooping or active Authentication via 802.1X
AirWatch’s Mobile Device Management
Employee owned and corporate owned devices deployed by IT admin or end user
Support for all major mobile platforms for a flexible BYOD program
Directory-based authentication, Via AD/LDAP, SAML, smart-card or tokens, two-factor user authentication
MaaS360 Mobile Device Management
Over the air (OTA) enrollment requests (SMS, emails, custom URL)
Device decommissioning by removal of corporate data
Corporate and employee owned (BYOD) device
Authenticate against Active Directory (AD)/ Lightweight Directory Access Protocol (LDAP), using a one-time passcode, or with
Security Assertion Markup Language (SAML)
Boxtone
OTA automated device self-provisioning
Enterprise-wide device Activate/Deactivate/Wipe/Quarantine
Users’ personal devices for BYOD
ProMDM
OTA Device enrollment using iPhone/iPad application, or SMS with OTP authentication.
BYOD with separation of private and business information based on multiple profiles
Simple Certificate Enrollment Protocol (SCEP) certificates for authentication
Case Study
Henry Ford Health System has deployed AirWatch − which currently secures and ensures BYOD compliance for approximately 3,000
corporate-owned mobile devices and 2,500 personal devices.
“Much of what we do as an IT organization is in response to what our customer base wants. With the capabilities of the [MDM platform], it
fulfills what we need to do. We’re very pleased with the product and the way it is in our environment.” - Michael Staroscia, Client Technical
Services Manager
http://bit.ly/ZL1GQq
Controlled Services exposure : Controlled Services exposure solutions help enterprises to expose applications and services (or just the
specific features) to users and devices through a specific set of rules. This helps enterprises cost effectively provide secu rity, compliance,
application provisioning and management for BYOD environments. Important features that enterprises need to consider:
Centralized user access management
Application Level Policy
User Level Policy
Device Level Policy
Vendor Characteristics
Enterasys Mobile IAM
End-to-end visibility and control over access levels of applications, in multi-vendor infrastructures
identity and role based policy management
Mobile device compliance at network layer
AirWatch’s Mobile Device Management
Enterprise Mobility
Page viii Advaiya Solutions Pvt. Ltd.
Configure device security policies based on device ownership
Set up enrollment restrictions to block users or devices based on platform, version, etc.
Require acceptance of Terms of Use before granting access
Enforce restrictions on device features, apps and web browsing
Detect compromised devices and perform automated actions
Restrict native apps on a device, including YouTube, Siri and Camera
Whitelist or blacklist publicly available apps
Enforce application compliance policies and monitor status
Control user’s ability to edit, share or open files in unauthorized applications
Require user to view content online or prevent download over cellular connection
Restrict document access to a specific location through geofencing
Absolute Manage for Mobile Device
Publish a list of approved apps onto each device and provide a single-click download/install process
Silently install/remove apps using management APIs
Policies to define window of time to access secured documents and corporate networks.
Policy-locked configuration profiles to stop non-compliant devices
AT&T Mobile Device Management
Centrally manage user roles and access controls
Set device policies per job function and user group
Case Study
City of Redlands Arms and Manages Mobile Devices for its Officers on Patrol. Now the force has access to critical information,
regardless of where they are, with the security that is demanded.
“What AT&T proposed to uswas MobileIron, a centralized platform for managing all our devices remotely. It immediately solved the biggest
issue, which was getting the 175 devices authenticated to use our Departmental apps. It also created our own private app store that makes
our apps available to every device, as needed. Ad we continue to develop our custom applications and push more and more information
out to the mobile devices, we need to make sure that sensitive information isn’t accidentally made public or put into the wrong hands.”
http://soc.att.com/VcNuwZ
SMS based services invocation: SMS based services invocation solutions help enterprise integrate text/voice/multimedia messages to
enhance application value and business to harness the power of SMS for application interface and usability enhancements, customer
interaction, marketing etc. Important features that enterprises need to consider:
SMS Integration with other services/Applications using APIs
2 way SMS
Bulk SMS
Vendor Characteristics
SMS Global
Seamless integration with applications, including web sites, intranets, CRM's, ERP's and other corporate software through APIs
Support of 2-way SMS for one-to-one communication with customers
Set up a personalized sender ID for SMS
Support of bulk SMS and WAP Push and VCard SMS
ZNI
Platform independent APIs to integrate with applications for better control and functionality
Used for lead generation and receiving feedbacks from customers
Supports bulk SMS packages that can be sent directly from Excel sheet
Enterprise Mobility
Page ix Advaiya Solutions Pvt. Ltd.
SMS Matrix
Send bulk message in fraction of seconds
Integration with legacy applications via use of simple APIs
Handles 2-way messaging using SMS, Voice and Text-to-Speech worldwide
Offers bulk FAX broadcasting
Bulk SMS scheduling
Easy SMS: Communicator 2
Integrate with any backend system or application seamlessly with wide range of APIs
Use of 2-way messaging and short codes for direct line of communication
Set priority in bulk SMS while sending high volume of messages
Send email to SMS to send out reminders
Enterprise Direct SMS
Standard protocols to integrate with enterprises' applications
Supports automated 2-way SMS communication channel for customers
Personalized short codes without rental or purchase fees
Multiple plans for different type of user
Mozeo Text Messaging
Allow mobile customers share their thoughts and pictures in real time
Text message marketing through use of unique mobile keywords for interaction
Supports mobile voting for an event, website or any marketing collaterals
Bulk SMS text blasting through online account center
Case Study
Five Tuition, needed an easy and cost effective way to communicate with a growing number staff and an expanding clientele base. With
SMSGlobal's API, Five Tuition integrated SMS into their existing database, to contact students, parents and staff via SMS.
"With growing communication demands, we needed to find a method of communication that would integrate seamlessly with our
current system. Following the very simple online instructions, and with limited programming skills, I was able to successfully integrate
our existing system with SMSGlobal's HTTP API. Our staff can now send bulk SMS's to tutors, students, or parents with ease." Peter
Hanley, Manager, Five Tuition.
http://bit.ly/Wjz2oi
Enterprise Mobility Gateway: Enterprise Mobility gateway solutions helps organizations to selectively distribute enterprise application
and data with remote users accessing enterprise information through variety of personal and corporate devices. Important features that
enterprises need to consider:
Enterprise application availability for mobile user
User Access Controls
Users/Device Authentication
Vendor Characteristics
Symantec App Center
Policy enforcement for defining access controls for enterprise
Enforce policies like user authentication, re-authentication, data encryption on local storage access, off-line access
Distribution of apps with corporate security and branding wrappers
NetScaler Access Gateway
Seamless point of secure remote access
Enterprise Mobility
Page x Advaiya Solutions Pvt. Ltd.
Supports single sign-on capabilities for all applications and data
Manage access control and set polices based on identity, location and the configuration of the endpoint device
User and device authentication based on the active directory
WSO2 Cloud Gateway
Allows user to selectively publish services and data to the cloud in secure environment
User based authentication and authorization.
Administrator to manage access control and set polices based on user identity and roles
Roverapp
Connect mobile devices with companies intranet applications securely without VPN
Access corporate applications and data based on their access policies and controls
Supports advance authentication methods
Case Study
To enable interactions between the mobile POS systems and back-end software, ODEL has used components of the WSO2 Mobile
Services Gateway Solution. This mobile POS systems serves as an express checkout option for those customers using a credit card to
purchase five or fewer items.
“WSO2 is a valuable partner in enabling us to offer new solutions like the mobile POS systems that help drive customer loyalty and set us
apart in the market.” – Thilanka Kiriporuwa, ODEL head of human resources and operations.
http://bit.ly/qtqmxH
Business Service Interface : Business Service Interface solutions allow organizations to expose internal applications through
intermediary services to facilitate effective business collaboration in B2B and remote working scenarios. Important features that
enterprises need to consider:
Messaging format supports
API support
Integration solution library
Vendor Characteristics
e-Zest Enterprise Application Integration
Supports Services oriented architectures (SOA’s) Messaging
Object Request Broker (ORB), Remote Procedure Call (RPC) and Subscribe based communication integration
iWay Application System Adapters
Supports transportation over messaging software like WebSphere MQ and JMS
Provides direct links into packaged applications using a variety of APIs
Enterprise Application Integration
Interactions with SaaS-based data via published APIs
Drag and drop assembly of application integration flows
Easily modifiable snaps based on open and standardized development environment
MuleSoft Connectors
Instant API connectivity to most applications and services
Provision of a library of repeatable integration solutions
EDI Application Integrator
Powerful architecture to build a library of application program interfaces (API’s)
Enterprise Mobility
Page xi Advaiya Solutions Pvt. Ltd.
EDI Application Integrator for drag and drop mapping
Jitterbit Application Integration Solutions
Application integration solutions supporting Enterprise Service Bus (ESB), Service Oriented Architecture (SOA), and point-to-point
integration architectures
Case Study
ACAL BFi turned to Jitterbit to replace its unreliable coding-based integration with a standard platform to reduce the costs and
resources required to provide a single view of the company’s ERP and CRM data.
“Our previous integration tools were very slow and needed constant monitoring. In contrast, Jitterbit provided us with a st andard platform
on which to build our integration projects, allowing us to quickly and cost-effectively synchronize data between our ERP and CRM
applications. I have been able to configure and manage Jitterbit by myself, while giving the rest of the company an up -to-date view of all
our pertinent data within the application they use on a daily basis.” -Keith Lovern, Technical Operations
http://bit.ly/15kS2Ds
Enterprise Mobility
Page xii Advaiya Solutions Pvt. Ltd.
Conclusion
Consumerization of IT has significantly increased the use of mobile devices in everyday life. With this widespread use of personalized
devices to access corporate data, enterprise mobility management has gain prominence across various business verticals. With the
Flexible work style scenarios enterprise apps can no more be restricted to inside the firewall usage. Though consumerization of IT has
boosted employee productivity and flexibility but IT still has the responsibility to protect organizational intellectual property and is
struggling with bring your own device (BYOD) programs and mobile data management. The mobility management framework helps
business to determine current stage of enterprise mobility management, set and accomplish goals, and build roadmap to advance.
Enterprise Mobility
Page xiii Advaiya Solutions Pvt. Ltd.
References
Enterasys Mobile IAM
http://www.enterasys.com/products/advanced-security-apps/enterasys-network-access.aspx
http://onefabric.net/byod/ETS_Mobile_IAM-Tracking_Users_and_Devices.pdf
MaaS360 Mobile Device Management
http://www.maas360.com/products/mobile-device-management/
http://content.maas360.com/www/content/ds/ds_maas360_mdm_overview.pdf
AirWatch’s Mobile Device Management
http://www.air-watch.com/solutions/mobile-device-management
AirWatch's Mobile Security Solution
http://www.air-watch.com/solutions/mobile-security
Boxtone
http://boxtone.com/mobile-device-management.aspx
ProMDM
http://www.promdm.com/product-overview/
Absolute Manage for Mobile Device
http://www.absolute.com/products/absolute-manage-mdm
SMS Global
http://www.smsglobal.com/in/en/sms/apis.php
http://www.smsglobal.com/in/en/sms/bulk_sms.php
http://www.smsglobal.com/in/en/sms/2-way_sms.php
SMS Matrix
http://www.smsmatrix.com/?sms-messaging
ZNI
http://www.znisms.com/index.html
Easy SMS: Communicator 2
http://www.clickatell.com/get-creative-with-sms/
Enterprise Direct SMS
http://www.maxis.com.my/business/lmc/data/eds.asp
Mozeo Text Messaging
http://www.mozeo.com/text-messaging-services-features.php
Symantec App Center
Enterprise Mobility
Page xiv Advaiya Solutions Pvt. Ltd.
http://www.symantec.com/app-center-enterprise-edition
NetScaler Access Gateway
http://www.citrix.com/products/netscaler-access-gateway/overview.html
WSO2 Cloud Gateway
http://wso2.com/products/cloud-gateway/
Roverapp
http://roverapps.com/secure-browser
e-Zest Enterprise Application Integration
http://www.e-zest.net/it-services/custom-it-development/eai/
iWay Application System Adapters
http://www.informationbuilders.com/products/applicationsystemadapters
http://www.informationbuilders.com/products/pdf/iWaySysAdapters.pdf
Enterprise Application Integration
http://www.snaplogic.com/what-we-do/solutions/enterprise-application-integration.php
http://www.snaplogic.com/resources/white-paper/future-proof-your-cloud-integration.pdf
MuleSoft Connectors
http://www.mulesoft.com/cloud-connectors-full
EDI Application Integrator
http://www.gecti.com/gxs.html
Jitterbit Application Integration Solutions
http://www.jitterbit.com/Solutions/application-integration
Enterprise Mobility
Page xv Advaiya Solutions Pvt. Ltd.
Glossary
Term Long form/ Expansion Definition
BYOD Bring Your Own Device Bring your own device (BYOD) (also called bring your own technology (BYOT), bring
your own phone (BYOP), and bring your own PC (BYOPC/BYOC)) means the policy of
permitting employees to bring personally owned mobile devices (laptops, tablets, and
smart phones) to their workplace, and use those devices to access privileged company
information and applications AD Active Directory It is the software system that stores, organizes and provides access to information in a
directory. In software engineering, a directory is a map between names and values. It
allows the lookup of values given a name, similar to a dictionary
LDAP Lightweight Directory Access
Protocol It is an application protocol for accessing and maintaining distributed directory
information services over an Internet Protocol (IP) network.
OTP One-time password A one-time password (OTP) is a password that is valid for only one login session or
transaction SMS Short Message Service (SMS) Short Message Service (SMS) is a text messaging service component of phone, web, or
mobile communication systems, using standardized communications protocols that
allow the exchange of short text messages between fixed line or mobile phone devices
VOIP Voice Over Internet Protocol It commonly refers to the communication protocols, technologies, methodologies, and
transmission techniques involved in the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Rooting It is the process of allowing users of smartphones, tablets, and other devices running
the mobile operating system to attain privileged control (known as "root access")
within subsystem. Jailbreak
detection Jailbreaking is the process of removing the limitations on mobile devices through the
use of software and hardware exploits. Jailbreaking permits root access to the
operating system, allowing the download of additional applications, extensions, and
themes that are unavailable through the official App Store.
Encryption Encryption is the process of encoding messages (or information) in such a way that
eavesdroppers or hackers cannot read it, but that authorized parties can
Single sign-
on Single sign-on (SSO) is a property of access control of multiple related, but
independent software systems. With this property a user logs in once and gains access
to all systems without being prompted to log in again at each of them.
Conversely, Single sign-off is the property whereby a single action of signing out
terminates access to multiple software systems.
App
blacklisting/
Whitelisting
Application Whitelisting is a proactive security method where only approved
programs are allowed to run and blocking rest of the programs from running by
default.
On the contrary, Application Blacklisting blocks certain programs while allowing rest to
run by default. SD Secure Digital Secure Digital or (SD) is a non-volatile memory card format for use in portable devices,
such as mobile phones, digital cameras, GPS navigation devices, and tablet computers.
Sandbox Sandbox (computer security), a virtual container in which untrusted programs can be
safely run.
Sandbox (software development), an online environment in which code or content
changes can be tested without affecting the original system DLP Data Leakage Prevention Data loss/leak prevention solution is a system that is designed to detect potential data
breach / data ex-filtration transmissions and prevent them by monitoring, detecting &
blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and
Enterprise Mobility
Page xvi Advaiya Solutions Pvt. Ltd.
at-rest (data storage)
OTA Over-the-Air A general term for wireless programming of devices such as mobile phones and set-
top boxes SAML Security Assertion Markup
Language It is an XML-based open standard data format for exchanging authentication and
authorization data between parties, in particular, between an identity provider and a
service provider. SCEP Simple Certificate Enrollment
Protocol Simple Certificate Enrollment Protocol is an Internet Draft in the Internet Engineering
Task Force (IETF). This protocol is being referenced by several manufacturers of
network equipment and software who are developing simplified means of handling
certificates for large-scale implementation to everyday users.
Quarantine Isolation of unfit devices to ensure data and application security
API Application Programming
Interface An application programming interface (API) is a protocol intended to be used as an
interface by software components to communicate with each other. An API is a library
that may include specification for routines, data structures, object classes, and
variables. CRM Customer Relationship
Management Customer relationship management (CRM) is a model for managing a company’s
interactions with current and future customers. It provides a 360 degree view of
customer data. [citation needed] It involves using technology to organize, automate,
and synchronize sales, marketing, customer service, and technical support.
ERP Enterprise Resource Planning Enterprise resource planning (ERP) systems integrate internal and external
management information across an entire organization—embracing
finance/accounting, manufacturing, sales and service, customer relationship
management, etc. ERP systems automate this activity with an integrated software
application. The purpose of ERP is to facilitate the flow of information between all
business functions inside the boundaries of the organization and manage the
connections to outside stakeholders.
WAP Wireless Application Protocol Wireless Application Protocol (WAP) is a technical standard for accessing information
over a mobile wireless network. A WAP browser is a web browser for mobile devices
such as mobile phones that uses the protocol.
VCard vCard is a file format standard for electronic business cards
VPN Virtual Private Network A virtual private network (VPN) extends a private network and the resources contained
in the network across public networks like the Internet. It enables a host computer to
send and receive data across shared or public networks as if it were a private network
with all the functionality, security and management policies of the private network
SOA Services oriented Architecture Service-oriented architecture (SOA) is a set of principles and methodologies for
designing and developing software in the form of interoperable services. These services
have well-defined business functionalities that are built as software components
(discrete pieces of code and/or data structures) which can be reused for different
purposes ORB Object Request Broker Object request broker (ORB) is a piece of middleware software that allows
programmers to make program calls from one computer to another via a network (so-
called remote procedure calls). ORBs promote interoperability of distributed object
systems because they enable users to build systems by piecing together objects from
different vendors, so that they communicate with each other via the ORB.
Enterprise Mobility
Page xvii Advaiya Solutions Pvt. Ltd.
RPC Remote Procedure Call Remote procedure call (RPC) is an inter-process communication that allows a computer
program to cause a subroutine or procedure to execute in another address space
(commonly on another computer on a shared network) without the programmer
explicitly coding the details for this remote interaction.
SaaS Software as a Service Software as a service, sometimes referred to as "on-demand software", is a software
delivery model in which software and associated data are centrally hosted on the
cloud. SaaS is typically accessed by users using a thin client via a web browser.
EDI Electronic data interchange It is a method for transferring data between different computer systems or computer
networks. It is commonly used by big companies for e-commerce purposes, such as
sending orders to warehouses or tracking their order.
ESB Enterprise Service Bus An enterprise service bus (ESB) is a software architecture model used for designing and
implementing the interaction and communication between mutually interacting
software applications in service-oriented architecture (SOA). As a software architecture
model for distributed computing it is a specialty variant of the more general client
server software architecture model and promotes agility and flexibility with regards to
communication and interaction between applications.
Enterprise Mobility
Page xviii Advaiya Solutions Pvt. Ltd.
Contact Us
Advaiya Solutions Pvt. Ltd.
G14-17, IT Park, Madri Industrial Area, Udaipur 313002 India
Phone:+91 294 305 1100 | Fax:+91 294 305 1300
Advaiya, Inc. (Washington)
2475 140th Ave NE, Suite 201, Bellevue, WA 98005 USA
Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201
Advaiya, Inc. (Silicon Valley)
440 North Wolfe Road, Sunnyvale, CA 94085, Silicon Valley
Phone: +1 (425) 739 3200 | Fax: +1 (425) 739 3201