securing salesforce mobile sdk apps with good dynamics

Download Securing Salesforce Mobile SDK Apps with Good Dynamics

Post on 13-Nov-2014




3 download

Embed Size (px)


Good Technology's session at Dreamforce 2012


  • 1. Securing Salesforce Mobile SDK Appswith Good DynamicsDimitri Volkmann, Good Technology, VP Product Strategy@dimiexter

2. Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include but are not limited to risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of intellectual property and other litigation, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of, inc. is included in our annual report on Form 10-Q for the most recent fiscal quarter ended July 31, 2012. This documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available., inc. assumes no obligation and does not intend to update these forward- looking statements. 3. Dimitri VolkmannVP, Product StrategyGood 4. Trends: Apps & BYO 550 KApps in the Apple App store, 25B150.8 M Corporate-liable devices expected to downloads as of March 5, 2012 ship by 2015400 K Apps in the Android marketplace, 11B 182.4 MdownloadsEmployee-liable devices expected to ship by 2015Worldwide Business Use Smartphone 2011 2015 Forecast and Analysis, September 2011 (Stephen Drake, Stacy Crook, Ramon Llamas)BI Intelligence for tablets data, 2 (January 16, 2012) for apps data, 3 for downloads data, 4 for apps data, 5;siu-container2012 Good Technology, Inc. All Rights Reserved.Company Confidential4 5. Protecting Enterprise Data: Security and ComplianceEncryptionCompliance & PoliciesBYO and App StoreDLP (Data Loss Prevention)112 233 Receive viaOpen and edit inStore unencrypted native email3rd party editor locally or cloud@ 6. Solutions to protect data MobileWebDevice Containers Virtual Desktop Management (MDM) Control ControlNothe the Data! Device App/Data 7. Pros & Cons Mobile Web Device ContainersVirtual DesktopManagement (MDM) + No data + Leverage existing+ Leaves Device + Leverage existing practicesintact for BYO infrastructure + Separate clearlyPersonal/Enterprise - Limited access to - Limited by Device+ Not Device Device resourcesOS, inconsistent dependent - Constrains User - Constrains BYO use Experiencecase - Requires new - No offline scenarioapproach 8. Good Technology Product Portfolio BYOD Security Productivity Collaboration Management InnovationBusinessProcess Good Mobile ManagerCollaboration Centralized& ProductivityGood For Enterprise Management 3rd Party AppsEnterprise AppsApplicationsCollaborationFoundationalDevelopmentPlatform Set PoliciesSecure,Trusted Mobile SecureAppKineticsCertified NOCSecureScalabilityProvision DevicesInfrastructureContainer SecurityTransportMutiplatformSupportDistribute Apps 9. The Good Container Approach Encryption (AES 256) Secure back-end connectivity Container level Policies & Compliance Restrict open with,cut/copy/paste, and iCloud sync Application level password Remote wipe of the container Detect jail-broken/rooted device Additional Application Services Push, Inter-container interop, Collaboration 10. A Container, not A Silo BasicGood Dynamics ContainersAppKineticsTMNon secure,OS-based,Data flow orExchange Secure Good Docs Mobile Messaging 11. Good Dynamics Components Client Libraries SDK and APIs Security and Application Services Good Control Management: Policies, Compliance, Users access to Apps Good Infrastructure Servers and NOC for Security and Management Services 12. Mobile Application Development withGood DynamicsBenefitsNo coding encryption Compliance and Policies handled by and secure back-end the frameworkaccessValue added services Secure Storage fasten development Secure Enterprise back-end accessApp levelmanagement, BYO Interoperability between containers, friendly client side single sign on Eco-system of ISVsand SIs Services 13. Mobile App Development for Salesforce Native Hybrid WebGood Technology Solutions Good Dynamics GFE SecureGood Dynamics Platform & BrowserPlatform & SDKPhoneGap plug-incontainer 14. Sample #1: How to Secure Storage ?Native (iOS)HybridiOS Native call:NSString* str = @"file contents"; Local File Usage:NSData* contents = [str fileEntry.createWriter(success, fail);dataUsingEncoding:NSUTF8StringEncoding];writer.onwriteend = function(evt) {};[contents writeToFile: @"sample.txt" atomically: NO];writer.write( file text contents );GD call:NSString* str = @"file contents";NSData* contents =No code changes required,[ dataUsingEncoding:NSUTF8StringEncoding];[GDFileSystem the plug-in uses GD LibrarieswriteToFile: contents name:@"sample.txt" error:&err]; 15. Sample #2: Enforce Custom Policies Native (iOS) Hybrid Retrieve the policies (defined by admin in the GC)GDiOS* library = [GDiOS sharedInstance]; GDApplication.getApplicationConfigNSDictionary *policy = [library getApplicationPolicy]; (success, fail);if ([[policy valueForKey:@"copyPasteOn"] isEqualToString:@"false"]) {};var config = JSON.parse(result); if(config[copyPasteOn] === false) {} Policy enforcement to be implemented by the developer 16. Developers: Next StepsWeb Apps now with GFE Secure BrowserNative Apps now with GDHybrid Apps PhoneGap plug-in in Good RoadmapGood Dynamics Network!input.jspa


View more >