report on vsaas product

36
Summer Internship Project Report Product development and documentation of MDM and CVISName : Harsh Biyani Roll No. : 1402064 Company’s Name : Reliance Communications Ltd. Role : Product Management 1

Upload: harsh-biyani

Post on 01-Feb-2016

225 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Report on VSaaS product

Summer Internship Project Report

“Product development and documentation of MDM and CVIS”

Name : Harsh Biyani

Roll No. : 1402064

Company’s Name : Reliance Communications Ltd.

Role : Product Management

1

Page 2: Report on VSaaS product

Certificate of Project Completion

This is to certify that Harsh Biyani, student of Post Graduate Diploma in Industrial

Management (PGDIM-21), National Institute of Industrial Engineering (NITIE), Mumbai has

successfully completed the project titled “Product Development and Documentation of

MDM and RCVS v2.0” at Reliance Communications Ltd.

The project was successfully completed under our guidance and supervision from the 6th

April, 2015 to 30th May 2015. We have derived benefits from the project and his contribution

to our organization is highly appreciated.

Based on the professional work done by him, this report is being submitted for the partial

fulfilment of Post Graduate Diploma in Industrial Management at NITIE, Mumbai.

I hereby convey my best wishes to him for all his future endeavours.

Dr. P K BiswasProfessor

NITIE Mumbai

2

Page 3: Report on VSaaS product

RELIANCE COMMUNICATIONS

CVIS

Go to Market Strategy

NRB

3

Page 4: Report on VSaaS product

Table of Content

1. Market Trend.............................................................................................................................2

2. Secondary Research...................................................................................................................3

2.1 Current Needs of different verticals.........................................................................................3

2.2 Key Customer Drivers.............................................................................................................. 6

4. Primary Research.......................................................................................................................7

5. Conclusion................................................................................................................................. 7

1

Page 5: Report on VSaaS product

1. Market Trend

According to MarketsandMarkets the Global video surveillance market revenue is estimated to grow from $42.06 billion in 2020 at a CAGR of 16.97% from 2014 to 2020. The IP system market is expected to grow at a CAGR of 23.51%. This growth is heralded by increased awareness regarding the IP system across the globe. MarketsandMarkets predicts the total video surveillance applications market to reach $25.43 billion by 2016

A video surveillance system is a combination of hardware and software component and is used to capture and analyze video.

Due to need for surveillance cameras with better video quality, the demand for IP-based video surveillance systems is growing, worldwide. While hardware comprised around 87% of the total video surveillance and VSaaS market.

Video surveillance-as-a-service (VSaaS) market is expected to grow at a CAGR 32.0% and has a current size of around $2.3 Bn during the forecast period (2014 to 2020). VSaaS eliminates the need for high storage capacity servers and is quite cost effective and thus, is finding increased demand and key players in the video surveillance industry are increasingly focusing on deploying cloud-based services.

2

Page 6: Report on VSaaS product

MarketsandMarkets expects that the global video surveillance storage market was estimated to be $4.90 billion in 2013 and is expected to grow to $10.41 billion in 2018. This represents an estimated Compound Annual Growth Rate (CAGR) of 16.3% from 2013 to 2018.

According to CMR’s India Video Surveillance Market Review, CY 2014, February 2015 release, the country’s video surveillance market was pegged at Rs 1,800 crore in CY 2014, up 25% compared to the previous year. Analog Cameras continued to dominate the market with a 60% contribution, while the rest came from IP Camera sales. The Indian market is dominated by analog surveillance camera but is witnessing a shift towards IP surveillance cameras on account of declining prices and demand for remote access. As per CMR estimates, by CY 2017, IP Cameras will overtake Analog Cameras in terms of market opportunity.

According to 6Wresearch, India IP video surveillance is projected to reach $1.4 billion by 2021.

According to a another report the video surveillance systems in India have captured major share of the modern security systems, though, installation and maintenance cost remains a major challenge for the growth of this segment.

2. Secondary Research

According to 6W Research Report, in 2011, vertical markets, government & transportation and banking & financial verticals accounted for total 77.89% of the market share, however other verticals such as retail, residential, commercial and industrial are seen as key growth

verticals. Global Trends

3

Page 7: Report on VSaaS product

2.1 Current Needs of different verticals

Retail

Customer Traffic – Counting number of customers who entered the store through traffic count

In Store Customer Behavior – Analyzing customer and their behavioral towards a product For Ex product counters across different time periods and seasons through heat mapping.

Operational Efficiency – To improve operational efficiency by allocating staff and placing products in right places by studying the heat zones

Security and Theft Alerts – To detect any kind of shoplifting and theft by raising alerts For ex Detect unusual after-hours movement in restricted areas, such as storerooms or offices, real time alert image of shoplifting or any suspicious item.

For Example

4

Page 8: Report on VSaaS product

In case of Spartan stores on Implementation Video Surveillance

Freed up time for central officers to monitor real time video

Gained capabilities to improve merchandising and staffing

Identifying cameras instantly when they are not working to prevent loss of goods

Healthcare

Monitoring patients in different wards from a dedicated centralized system so that a hospital staff can notify from one place reducing manpower and cost

Comply with Operating-Room Procedures – alerts and alarms shall be raised if someone is detected in the restricted area

For Example

Case Study of King Edward Memorial Hospital

Genesis worked closely with Genetec professional engineering and custom solutions to come up with interfaces threat management, access control, CCTV, License Plate Recognition, and fire alarm

Banking

Video Analytics to improve the operational efficiency by allocating staff in case of long queues and by traffic counting

Monitoring Vaults and Safes, Recognition of Parking Vehicle and people doing suspicious activities or other unauthorized entry into secure areas within a bank, data center, or corporate office

Detecting the suspicious activities like intrusion or tampering of camera by raising an alert or alarm in ATM.

Government

5

Page 9: Report on VSaaS product

Enable rapid and automated back-tracking in stored video to pinpoint events through fast retrieval from storage system. After 26/11 attack Indian Government has become cautious and wants to fast service in retrieving video recordings of certain events for investigation and other critical operations.

Detect breaches of a secure perimeter though alarm like near parliament or vidhan sabha area

Case Study on Transportation Agency Centralizes Video Surveillance

Enhanced Safety and SecurityCost Savings thorugh Centralised monitoring Centralized storage and management means that TfGM will no longer need to purchase and maintain video surveillance storage and management servers at each station, reducing equipment costs and power consumptionEase of Operations Authorized station personnel and police can view video from any camera, from any web browser.Event tagging for review and archival purposes

2.2 Key Customer Drivers

Health care

Monitoring Patients :- For threat Management

Retail

Customer tracking and operational efficiency :- Analytics and cloud service will be required and is the main driver.

Government

Efficient Storage Services: to track suspicious events

Banking

Analytical Services : To note suspicious activities and provide alert services.

Features that can be included:

6

Page 10: Report on VSaaS product

Event tagging for review and archival purposes (Government for important videos)

Clipping and appending Videos for important parts which is useful to them (Tannins Restaurant and Wine Bar Improves Security and Productivity with Samsung Video Surveillance System)

Facial Recognition and Improving Entry System by matching through Database of employees (University of San Francisco Customer Case Study )

Providing Complete Solution with the smart phones by providing alert and giving access

to particular area along with the enterprise mobility apps by providing complete

solution ( Del Papa Case Study by Cisco)

To transform property or office management by automating processes from temperature controls to work-order management, helping to increase tenant satisfaction, lower energy costs, and make more efficient use of staff time by speeding up response to tenant requests.( High Tech Offices in Mumbai, Bangalore. Transwestern Customer Case Study by Cisco )

4. Primary Research Survey from Market to some question led to understanding

Decision of buying is based on cost majorly in SME’s and thus brand preference was low and one company was using local cameras. Storage system used was on premise due to lack of awareness. For smaller scale bank another important factor was being the solution as user friendly. Monitoring on centralized or mobile system was counted as the most important features. But banks were willing to leverage the video analytics and are also upgrading their system for better security. Customer seemed to be happy with their current provider with minor hardware problems which they are ready to deal with. Up gradation and maintenance cost is an area where customers want to cut down.

CVIS has partial awareness among its existing customers. Customer knowing about it found cost as the major constraint to not go with it. One customer who is still in buying stage wanted to know about the product.

5. Conclusion Awareness about power of video analytics is not very high but they are ready to adopt it

with new up gradation

7

Page 11: Report on VSaaS product

According to both Secondary and Primary Research, It can be concluded enterprises are shifting towards IP surveillance system on account of declining prices and demand

But SME’s wants to move slowly by upgrading themselves to new features

Recommendation

Features that can be included:

Event tagging for review and archival purposes (Government for important videos)

Clipping and appending Videos for important parts which is useful to them (Tannins Restaurant and Wine Bar Improves Security and Productivity with Samsung Video Surveillance System)

Facial Recognition and Improving Entry System by matching through Database of employees (University of San Francisco Case Study by Cisco)

SuggestionProviding Complete Solution with the smart phones by providing alert and giving access to particular area along with the enterprise mobility apps by providing complete solution ( Del Papa Case Study by Cisco)

To transform property or office management by automating processes from temperature controls to work-order management, helping to increase tenant satisfaction, lower energy costs, and make more efficient use of staff time by speeding up response to tenant requests.( High Tech Offices in Mumbai, Bangalore ( Transwestern Customer Case Study by Cisco)

Branding

Need is to be created through awareness as product is not very popular out of 2 people one did not know about the product

Free trial version can be given to our new customers and guide them how to use the cloud and analytical services

8

Page 12: Report on VSaaS product

NITIE Mumbai

RELIANCE COMMUNICATIONS

Enterprise Mobility Services

9

Page 13: Report on VSaaS product

Table of Content

1.Product Overview………………………………………………………………………………………………………………..2

2. Market Size…………………………………………………………………………………………………………………………2

3. Competitors Analysis…………………………………………………………………………………………………………..3

4. Target Segment…………………………………………………………………………………………………………………..6

5. Features Explanations………………………………………………………………………………………………………….9

6. Reference Architecture………………………………………………………………………………………………………12

7. Current Deployment Architecture………………………………………………………………………………………14

10

Page 14: Report on VSaaS product

1.Product Overview

1.1 Mobility

As mobility force is growing it is very important that the constraints are removed from employees of working from a static location. Through Mobility it will enable them to work outside the standard PCs with new freedom and flexibility in the way employee’s work. Enterprise mobility management solutions allow your organization to securely provide access to the apps and data people need to do their jobs effectively no matter where they are or what devices they use.

1.2 Mobility Device Management

Mobile Device Management comes in the form of software that companies can use to lock down, control, encrypt, and enforce policies on mobile devices such as tablets and smart phones.

1.3 Mobility Application Management

It is a form of software and service responsible for provisioning and controlling access to internally develop and commercially available business settings.

1.4 Mobility Content Management

It has discrete systems, modules or add-ons of larger content management systems capable of multi channel content delivery.

2. Market Size

2.1 IndiaCurrent Market Size of enterprise mobility is of $1Bn and is increasing at staggering rate of 40 % year on year with expectation of it reaching to $1.8Bn by 2017. India has a 205 million enterprise mobile work force.

2.2 Global

11

Page 15: Report on VSaaS product

Current Market size of $72 Billion and is growing at CAGR of 15% from 2011 and expected to increase at this rate till 2020.Spending on Enterprise mobility by I.T is expected to increase from 5 to 10-12% of the annual spending of I.T of an organisation.MDM share is expected to be around $3.94 Billion in 2019.

3. Competitors Analysis

IBM

Features Highlights

Eight-character alphanumeric mobile device password, expiration every 90 days, device lock after 15 minutes, password prompt on device should pause for incremental time after each unsuccessful login to protect against brute-force login attempts.

Device wipe, remote (by administrator) if device is lost or stolen, after 10 invalid password attempts to protect against brute-force login attempts

Data-at-rest encryption for employees with high-value or sensitive access, Encryption key strength of at least 128 bits, protection for associated encryption keys exchanged or stored in a manner not easily retrieved in readable form at rest on the file system or in transmission – Method to reflect the encryption status of a given device based on value, application of policy or other manner

Bluetooth configuration set so that it is not discoverable, and only connected with paired devices on all handheld devices supporting these features

Requirement that remote access for data synchronization or to the corporate infrastructure must go through an approved remote access gateway and support the required security authentication

Local synchronization using direct Universal Serial Bus (USB), infrared, Bluetooth, wireless local area network (WLAN), local area network (LAN) or wireless connections

Antivirus program run on any device with access to the corporate network Firewall program run on the mobile device

Maas360

12

Page 16: Report on VSaaS product

Features Highlights

Establish an automated device approval process

Support multiple mobile OS platforms

Simplify the enrolment steps for employees

Authenticate users against corporate AD/LDAP

Set specific BYOD configuration options over the air

Provision email settings

Perform automated actions when a device goes out of compliance

Separate corporate and personal data on devices

Distribute apps and docs to personal devices

Selectively wipe corporate data without impacting personal files

Implement a self-service support portal for users

Set privacy settings to block the collection of personal information

Deliver usage monitoring alerts to help employees control expenses

Airwatch

Feature Highlights

Enrolment

Activate multiple users and devices in scale via customizable SMS, email and URL options Authenticate using Directory Services (LDAP/AD, Domino), smart-cards, tokens or SAML

Automate the configuration of policies, settings, certicates and access to enterprise services Provision internal, purchased and recommended public apps via a custom app catalog Provide self-service user activation and device registration

Configuration Streamline asset management across corporate, employee-liable and shared devices Automate prole distribution by user roles, groups or device types Configure corporate policies, settings, certicates and access to email (Exchange, Traveler,

BPOS-D, Ofce365, Gmail), VPN (IPsec, Juniper SSL, F5 SSL, Cisco AnyConnect) and Wi-Fi services

13

Page 17: Report on VSaaS product

Provide self-service options, including passcode reset, device locator, lock and wipe, compliance monitoring, app requests and support Security

Allow or block devices connecting to corporate email based on policies Audit devices for compliance with corporate policies, settings, apps, third parties and more Detect compromised devices and set up automated business rules for responding to security

threats Configure privacy policies based on device ownership Applications

Distribute and update enterprise apps through an HTML or native app catalog Limit selection, recommend and ease the distribution of publicly available apps Manage app inventory, black lists, compliance policies and automated rules for managing

violations Simplify the distribution and management of apps purchased through the Volume Purchase

Program Build custom apps leveraging SDK features such as single sign-on, app pass codes, app lock

and wipe Monitoring

Track data and roaming usage against pre-dened thresholds, and alert user/IT before overages occur

Set up console, email or SMS alerts for specic device or network actions, user actions or system performance

Generate 100+ customizable reports with automated distribution across the IT team Support

Perform device diagnostics remotely to identify issues Provide remote assistance to mobile users and communicate from the console via SMS

messaging Provide users with remote management capabilities through a self-service portal Manage troubleshooting cases and system incidents using an integrated case management

system

Vodafone

Vodafone Secure Device Manager is a cloud-based, cost-effective solution that enables your IT department to:

Feature Highlights

Remotely manage your mobile devices over the air

14

Page 18: Report on VSaaS product

Push critical in-house or public applications Configure email accounts over the air Lock the device remotely and erase all user data if it is misplaced Secure devices with password compliance and data encryption on the device Set compliance policies on the device in accordance with the IT policies Set corporate policies.

It also offers Managed Services for Vodafone Secure Device Manager, which allows the organisation to dedicate resources as per their business requirements and leave the smartphone management to us.

Benefits

Ensures all devices are totally secure and that only the latest software and applications are used

Reduces the cost and complexity of managing your mobile devices Installs software and applications remotely to thousands of users Queries devices over the air, effectively diagnoses and resolves issues

Airtel

Feature Highlights

Secure email services Prevents employees from forwarding sensitive data to personal IDs Official calendar, contacts and notes are separate Functions on all popular android and iOS smartphones

Containerization Separation of corporate and personal data Secure access to enterprise applications and data No data leakage outside corporate data container on device

Business App Box Get your own secure business app store over VPN Mobilise corporate IT Write business applications once, use it across mobile platforms Integrate organization owned, telco owned or hybrid business applications

Mobile Device Manager Centrally deploy, administer and secure all mobile devices

15

Page 19: Report on VSaaS product

Manage and enforce policies over the air for corporate and employee owned devices Use remote wipe to erase all corporate data stored on the device incase it is lost or stolen Unsafe apps can be tracked and removed Remote application distribution and software upgrade

4. Target Segment

Manufacturing

The application of mobility inside the plant is examined but so are opportunities for customer facing applications for gathering information and providing value at product facilities, in providing after sales service, for gathering research information, and in product marketing processes. Some of these areas could revolve around customer interactions, inventory management, quality assurance, and asset tracking.Extensive use of mobility in the workplace will force organizations in the manufacturing industry to redraft many of their technology strategies in order to adapt to this evolution.Mobility can be applied effectively, one promising area is in capturing customer feedbackCreative use of mobility could see GPS-enabled sensors attached to mobile assets such as dump trucks, which could allow workers to track assets using wireless handheld devices. In fact, mobile devices could serve as safety devices, alerting workers who enter a hazardous area

Insurance

Analysis of the insurance value chain shows how mobility could impact processes in life insurance and property and casualty, value chains that are ripe for redesign and optimization using mobile devices. By mobilizing agents, insurers can reach new target markets faster. Agents who are provided with access to information anytime anywhere can not only improve consumer satisfaction, but close business more quickly.By improving self-service options and pushing more tasks to agents, insurers can reduce customer service calls and improve operational efficiency. Enabling claims capture from the field and providing real-time access to required information including third parties or service providers will allow insurers to control and manage losses better

16

Page 20: Report on VSaaS product

FMCG

A mid size FMCG Company having 5 manufacturing plants, 40 sales offices, 15 warehouses, 300 distributors, 30000 retailers and 400-500 direct sales force for managing sales and distribution activity. If one looks at this scenario, it looks small in terms of absolute numbers. But in terms of operations it is huge, each member of sales team has to visit every retailer to collect order, explain products, schemes, differentiators, submit these orders, make sure that delivery happens to retailer on promised time, collect payments, manage credit limits, visits to distributors, warehouses, competitive intelligence, and many more things like this. On top of all this team member has to achieve targets and also submit daily reports to his superiors which in turn will create consolidated report

Banking

Through enterprise mobility in banking access to real-time information allows for faster and

more informed decision-making. Institutions and individuals can more easily collaborate. The

ability to safely scan or directly import enrollment forms, loan applications, and other

documents through mobile devices that are securely connected to the corporate network

allows bank, insurance, and other financial services representatives to more efficiently and

quickly process customer data. Anytime, anywhere access to information enables executives

to review and approve financial transactions on the road, improving efficiency, productivity,

and response time. Mobile devices give financial organizations the option to go paperless,

improving operational efficiencies and cutting costs associated with printing and mailing

documents to customers and other financial institutions, as well as eliminating lengthy

response times.

Public Sector

Government organizations face a dual challenge: fulfilling their responsibility to protect and

serve citizens—from security and disaster response to the administration of public

entitlements. Government organizations must be able to share and act on vital information

as effectively as possible across functions, agencies and borders. Agencies must support

17

Page 21: Report on VSaaS product

government agents wherever they work, whether at a main or remote agency, at home or

on the road, by providing reliable, high-availability access to resources. IT must also deliver

data to multiple branch locations, often across state and national boundaries, and recover

quickly from service disruptions. Content privacy and security are essential to ensure that

confidential information is not compromised. Protect confidential data and keeping sensitive

government data secure by granting flexible, multi-level access to authorized personnel.

Recover from disasters quickly and effectively, ensuring that desktops, applications and data

are accessible prior to, during and after a disaster so that government workers can respond

to emergencies in real-time. Provide high availability of data to increase worker productivity

and satisfaction, enabling government workers to have uninterrupted, secure and instant

access to desktop and applications as they roam from location to location, device to device

and network to network. Increase IT productivity to meet the needs of all workers while

reducing operational costs.

Entertainment

Formulating enterprise-wide mobile strategy will create mobile channels for ensuring a lasting engagement with the B2B and B2C audience. Media and Reporting have to work on field and needs to constantly be connected to the organisation and data thus needs to be protected.

Logistics/courier Services

Companies like DHL, FedEx, Blue Dart has large number of employees who are on foot to deliver the products and services on time. Also these companies have different offices throughout which is needed to be updated with their courier services. With growing Ecommerce, Logistics Service will also grow their dependency on one another will increase.

Call Centre’s & BPO

Call Centre’s & BPO’s can let their employees work from home through implementation of mobility and BYOD which will help them to reduce infrastructure and employees services cost.

Consulting Companies

18

Page 22: Report on VSaaS product

Consultant need to be in service for client 24*7 and thus through enterprise mobility they will have an easy access to connect with the clients and their companies. Thus they improve their productivity by reducing work hours but continuing to leverage their service

Health Care

Physicians and healthcare workers increasingly depend on their own mobile devices to access medical and patient data at the point of care. Hospital can keep the doctors connected and let them know the condition of patients and schedule of visits can be planned. Accordingly it will avoid rush in hospital and long queues. While mobile technology improves the quality and cost of patient care, it increases IT workloads and the potential for information security.

Retailers In retail, smartphones have brought new life into an already complex web of multichannel retailing. Mobility can be a boon for the retailer as much as for the customer. For the customer, benefits accrue from discounts that come from personalized marketing derived from strong analytics. For the retailer, mobility provides the ability to deliver relevant applications at each customer touchpoint in conjunction with the overall strategy for channel management. The challenge for the retailer is to target the customer with compelling promotions based on whether they are in the store, on the road, or at home. A good solution may be to create a uniform customer engagement platform that helps filter technology based on customer sentiment and behavior.

Education

Mobile devices can make a huge difference in classrooms around the world, but keeping them safe can be quite a challenge. Learn how cloud-based Mobile Device Management (MDM) can enable secure access to school resources like Wi-Fi, app and file sharing considerations, and more.

Work from Home & Free Lancers as Employees

Mobility for part time workers or people who work as free lancers for organizations or artists who likes to work in isolation with comfort at home.

19

Page 23: Report on VSaaS product

5. Features Explanations

Mobile Platforms

Compatibility to different OS

The feature should be supported in different Operating System like IOS, Windows, Android, Symbian etc. Thus it should be supported by different OS as different employees work on different OS

Extended Android API’s Knox 3LM etcWith new extended API’s on android it must be supported on every mobile device and these feature should not create blockage for the extended API’s MDM

Password ProtectionApps and device should be password protected to keep corporate secured from inappropriate use of device

Remote Locking Device should be allowed to be locked from a remote point in case of device loss or theft the mobile can be locked remotely and protect the data

Select WipingWiping of Data from mobile device is required to clean corporate and critical data in case of danger is sensed of data theft.

Setting VPN, APNAccess point names and virtual Point networks are set and used and are different ways to exchange data over network. APNs users connect their cell phones to a particular wireless provider’s network, while VPNs protect private information network. Which helps to secure transfer of data and connection to network.

Disable Features Wifi, Bluetooth, CameraDisabling feature which may cause security threat or may lead to attacks and stealing of data from cell phones

Configuration Monitoring and AuditingAuditing and Monitoring of device must be done to track leakage of data or attacks from any software which may make data more prone for further loss.Security

20

Page 24: Report on VSaaS product

Blacklisting/Whitelisting Blacklisting of apps which are threat to security will block such apps where as whitelisted will added to mobile for corporate utility

Data Loss Prevention,Email DLPPreventing of Data loss through email and malware attacks through network by enabling higher security

Device Jail breaking(IOS)/Rooting(Android)/ Unlocking(Windows) DetectionDetecting Jail breaking, rooting or unlocking of device so that command for wiping or locking of device can be given

Device Level Encryption ( Encrypting Sensitive Info)Encryption of sensitive information or data contained in device to protect from unauthenticated user

Geo fencing In this location of device can be determined and locking or wiping selective information can be done if it is beyond certain premise or boundary.

Time fencing Time bound can be applied for device to stop usage of device or its particular apps after office hours or certain fixed timing

Mobile and App- Level Micro VPNVPN can be applied at very low level that is between communication between apps at API level

App authentication, Facial Recognition Card SupportUser can be authenticated through application like facial recognition or card support.

Includes Firewall Firewall to block of using web related things from unauthenticated source.

Application Management Use self-service app delivery

Simplify shopping experience for enterprises by providing an end-to-end order fulfilment process, tailor made catalog for each user and giving support for multiple languages.

Full featured enterprise app store App store for enterprises, from where apps can be incorporated into devices by downloading directly from there.

Sandboxing / ContainerizationIt is an approach to software development and mobile application management that limits the environments in which certain code execute

App Wrapping

21

Page 25: Report on VSaaS product

It is the process of applying management layer o a mobile app without requiring any changes to underlying application

Block of Copy/Paste between apps and emailTo prevent flow of data through apps and emails.

App Inventory tracking and monitoring UsageTracking and monitoring the inventory of applications which is downloaded and added into it.

Virtual Access to desktop AppsVirtual access from mobile apps to desktops apps, thus reducing the dependency of sitting on work station.Content Management

Encrypted document ContainerDocument contained in the storage is encrypted to protect from any outside threat.

Secure Email and Share point accessSecuring Email and share point in transferring file and data between apps and system.

File Server AccessAccess to file Server is secured to protect sensitive information and data.Network Management

Device Usage ManagementUsage of device is monitored and tracked and its data.

Roaming cost controlCost control by restricting usage of voice calls and internet through geo-fencing

Device DiagnosticDiagnosis of device in case application stops responding or device gets hanged.

Service Management Help Desk Support Management Service Monitoring

Integration with PC management tools Offers a separate or integrated PC Management tool Integrates with a third-party tool Offers integrated management console for PC & mobile management

Reporting Real- time Dashboards

Syncing the data with server on real time basis Device Level Analytics

Analytics of data downloaded and uploaded in corporate applications Alerts and automated response

22

Page 26: Report on VSaaS product

6. Reference Architecture

Home App: It is an app through which allow to enforce I.T and mobile services and security on devices. Employees use this app to provide access to the corporate apps and live services.

NetScaler: It is a secure application and data access solution that provides administrators granular application and data-level control while empowering users with remote access from anywhere. It gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection and compliance management.

Device Manager: Device Manager allows IT to manage mobile devices, set mobile policies and compliance rules, gain visibility to the mobile network, provide control over mobile apps and data, and shield the corporate network from mobile threats. It helps in simple integration and security of device on corporate network.

App Controller: App Controller manages and enables access to an organization's mobile, web and SaaS apps and ShareFile data resources.

ShareFile: ShareFile is an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.

Structure of Architecture

The architecture is based on the device or app management requirements of the enterprise. The components are modular and build upon each other.

Enterprise Edition

XenMobile Device Manager XenMobile NetScaler Connector NetScaler XenMobile App Controller Virtual Appliance ShareFile StorageZones Controller

23

Page 27: Report on VSaaS product

Work Mail is a native iOS and Android email, calendar and contacts app. Users can attach docs to emails and save attachments back using ShareFile, open attachments and web links, including internal sites, with WorxWeb, and view the free/busy information of colleagues before sending a meeting invite, all while staying inside the secure container on the mobile device. WorxMail supports ActiveSync and Exchange and offers security features, such as encryption, for email, attachments and contacts.

WorxWeb is a consumer-like native mobile browser for iOS and Android devices that enables secure access to internal corporate web, external SaaS, and HTML5 web applications. WorxWeb leverages MDX technologies to create a dedicated VPN tunnel for accessing a company’s internal network and the other MDX security features to ensure that users can access all of their websites, including those with sensitive information. WorxWeb offers a seamless user experience in its integration with WorxMail to allow users to click on links, such as ‘mailto’ and have the native apps open inside the secure container on the mobile device. ShareFile.

Figure 7.1 Architecture of Enterprise Edition

24

Page 28: Report on VSaaS product

NetScaler is the secure application and data access solution for the infrastructure

NetScaler MPX appliances are hardened network appliances that offer up to 120 Gbps performance.

NetScaler SDX is a high-density consolidation platform that combines Xen-based virtualization with the advanced architecture of NetScaler MPX to run up to 40 NetScaler instances simultaneously without sacrificing performance or security.

NetScaler VPX virtual appliances run as virtual machines (VMs) on popular hypervisors, allowing NetScaler to be provisioned on –demand using inexpensive, industry-standard servers

7. Current Deployment Architecture

The deployment architecture is done cost as per number of sessions. For NetScalar 10,000 sessions increment will be INR 22 per user per month and for 20000 sessions increment will be INR 16 per user per month. Requirement of a

25

Page 29: Report on VSaaS product

third party certificate will be needed. Cost for a single domain with one server for 5 years will cost around INR 1.34 Lakhs. These will be routed through

26