SlideShare a Scribd company logo
Securing Salesforce Mobile SDK Apps
with Good Dynamics

Dimitri Volkmann, Good Technology, VP Product Strategy
@dimiexter
Safe harbor
 Safe harbor statement under the Private Securities Litigation Reform Act of 1995:

 This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties
 materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results
 expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be
 deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other
 financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any
 statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services.

 The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
 functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our
 operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of
 intellectual property and other litigation, risks associated with possible mergers and acquisitions, the immature market in which we
 operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new
 releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization
 and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of
 salesforce.com, inc. is included in our annual report on Form 10-Q for the most recent fiscal quarter ended July 31, 2012. This
 documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of
 our Web site.

 Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently
 available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based
 upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-
 looking statements.
Dimitri Volkmann

VP, Product Strategy
Good Technology
dvolkmann@good.com
Trends: Apps & BYO


                                   550 K
                    Apps in the Apple App store, 25B                                                                                                      150.8 M
                                                                                                                                                   Corporate-liable devices expected to
                     downloads as of March 5, 2012                                                                                                             ship by 2015




                                400 K
               Apps in the Android marketplace, 11B                                                                                                       182.4 M
                            downloads                                                                                                          Employee-liable devices expected to ship
                                                                                                                                                               by 2015



    Worldwide Business Use Smartphone 2011 – 2015 Forecast and Analysis, September 2011 (Stephen Drake, Stacy Crook, Ramon Llamas)
    BI Intelligence for tablets data, 2 http://148apps.biz/app-store-metrics/ (January 16, 2012) for apps data, 3 http://www.apple.com/pr/library/2011/12/12Apples-Mac-App-Store-Downloads-Top-100-Million.html for downloads data,   4

    http://www.distimo.com/blog/2012_01_google-android-market-tops-400000-applications/ for apps data, 5http://www.zdnet.com/blog/hardware/android-markets-10-billion-downloads/17015?tag=content;siu-container

©2012 Good Technology, Inc. All Rights Reserved.                                            Company Confidential                                                                                    4
Protecting Enterprise Data: Security and Compliance

                          Encryption
                          Compliance & Policies
                          BYO and App Store
                          DLP (Data Loss Prevention)
                1
                1                2
                                 2                    3
                                                      3
           Receive via    Open and edit in    Store unencrypted
           native email    3rd party editor     locally or cloud



                    @
Solutions to protect data

                       Mobile
      Web              Device     Containers
 Virtual Desktop     Management
                       (MDM)

                       Control     Control
      No
                        the         the
     Data!
                       Device     App/Data
Pros & Cons
                             Mobile
       Web                   Device
                                                   Containers
  Virtual Desktop          Management
                             (MDM)

 + No data               + Leverage existing    + Leaves Device
 + Leverage existing     practices              intact for BYO
 infrastructure                                 + Separate clearly
                                                Personal/Enterprise
 - Limited access to     - Limited by Device    + Not Device
 Device resources        OS, inconsistent       dependent
 - Constrains User       - Constrains BYO use
 Experience              case                   - Requires new
 - No offline scenario                          approach
Good Technology Product Portfolio
                  BYOD         Security       Productivity       Collaboration         Management            Innovation


Business
Process                                                                                                               Good Mobile
                                                                                                                       Manager
Collaboration                                                                                                         Centralized
& Productivity        Good For Enterprise                                                                             Management
                                                         3rd Party Apps              Enterprise Apps
Applications            Collaboration

Foundational
Development
Platform                                                                                                               Set Policies


Secure,
Trusted Mobile             Secure      AppKinetics    Certified           NOC    Secure            Scalability
                                                                                                                    Provision Devices
Infrastructure            Container                   Security                  Transport



Mutiplatform
Support                                                                                                              Distribute Apps
The Good Container Approach
• Encryption (AES 256)
• Secure back-end connectivity
• Container level Policies & Compliance
     Restrict ‘open with’,
      cut/copy/paste, and iCloud sync
     Application level password
     Remote wipe of the container
     Detect jail-broken/rooted device
• Additional Application Services
    •   Push, Inter-container interop, Collaboration
A Container, not A Silo

         Basic            Good Dynamics
       Containers          AppKinetics          TM




      Non secure,
      OS-based,
      Data flow or
      Exchange

                                                     Secure
                                   Good               Docs
                             Mobile Messaging
Good Dynamics Components
                           Client Libraries
                           SDK and APIs
                           Security and Application Services

                       Good Control
                       Management: Policies, Compliance,
                       Users access to Apps

                       Good Infrastructure
                       Servers and NOC for Security
                       and Management Services
Mobile Application Development with
Good Dynamics
                                  Benefits
                                        No coding encryption
 Compliance and Policies handled by     and secure back-end
 the framework                          access
                                        Value added services
 Secure Storage                         fasten development
 Secure Enterprise back-end access      App level
                                        management, BYO
 Interoperability between containers,   friendly
 client side single sign on             Eco-system of ISVs
                                        and SIs
 Services
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
Mobile App Development for Salesforce

         Native               Hybrid             Web




Good Technology Solutions
                             Good Dynamics     GFE Secure
      Good Dynamics
                               Platform &       Browser
      Platform & SDK
                            PhoneGap plug-in    container
Sample #1: How to Secure Storage ?

      Native (iOS)                                                                      Hybrid

iOS Native call:
NSString* str = @"file contents";                       Local File Usage:
NSData* contents = [str                                 fileEntry.createWriter(success, fail);
dataUsingEncoding:NSUTF8StringEncoding];                …
                                                        writer.onwriteend = function(evt) {…};
[contents writeToFile: @"sample.txt" atomically: NO];
                                                        writer.write(“ file text contents ”);
GD call:
NSString* str = @"file contents";
NSData* contents =                                                No code changes required,
[ dataUsingEncoding:NSUTF8StringEncoding];
[GDFileSystem
                                                                 the plug-in uses GD Libraries
writeToFile: contents name:@"sample.txt" error:&err];
Sample #2: Enforce Custom Policies

       Native (iOS)                                                                     Hybrid

                           Retrieve the policies (defined by admin in the GC)

GDiOS* library = [GDiOS sharedInstance];                 GDApplication.getApplicationConfig
NSDictionary *policy = [library getApplicationPolicy];   (success, fail);
if ([[policy valueForKey:@"copyPasteOn"]                 …
isEqualToString:@"false"]) {…};                          var config = JSON.parse(result);
                                                         if(config[“copyPasteOn”] === “false”) {…}




                       Policy enforcement to be implemented by the developer
Developers: Next Steps

  Web Apps – now with GFE Secure Browser
  Native Apps – now with GD
  Hybrid Apps – PhoneGap plug-in – in Good Roadmap



Good Dynamics Network
https://begood.good.com/community/gdn-welcome!input.jspa
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics

More Related Content

PDF
Growth with IBM Mobile Enterprise
PDF
Pulse 2013 Mobile Build and Connect presentation
PDF
UK Innovate 2012 mobile keynote
PPTX
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
PPTX
IBM Software Day 2013. A mobile strategy is essential
PDF
Mobile Device Management: Taking Conainerisation to the Next Level
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PDF
Future proof and extend your IAM to Mobile Platforms and any connected device
Growth with IBM Mobile Enterprise
Pulse 2013 Mobile Build and Connect presentation
UK Innovate 2012 mobile keynote
Sybase SUP Mobil Uygulama Geliştirme Genel Bilgilendirme
IBM Software Day 2013. A mobile strategy is essential
Mobile Device Management: Taking Conainerisation to the Next Level
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Future proof and extend your IAM to Mobile Platforms and any connected device

What's hot (17)

PPT
An Overview on IBM MobileFirst Platform v7
PPT
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
PDF
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
PPTX
Mobile Management
PPTX
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
PDF
IBM Presentation for Mobile Developer Summit India
PPTX
IBM Worklight - Introduction
PDF
Securing mobile devices_in_the_business_environment
PDF
Mobile World Congress 2013 IBM-ATT Session
PDF
IBM Mobile Overview for Ecosystem Partners
PDF
Enterprise Mobility Solutions: Enterprise operations on the move
PDF
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
PPTX
Ibm mobile first briefing
PPTX
Security and Mobile Application Management with Worklight
PPTX
Soluções F5 Networks - FORENSE Tecnologia
PDF
IBM mobile strategy at Innovate 2012
PDF
The Mobile Way Brochure
An Overview on IBM MobileFirst Platform v7
Fujitsu Scanners and Datacap, Invoice and Variable Document Capture Innovations
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
Mobile Management
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Presentation for Mobile Developer Summit India
IBM Worklight - Introduction
Securing mobile devices_in_the_business_environment
Mobile World Congress 2013 IBM-ATT Session
IBM Mobile Overview for Ecosystem Partners
Enterprise Mobility Solutions: Enterprise operations on the move
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Ibm mobile first briefing
Security and Mobile Application Management with Worklight
Soluções F5 Networks - FORENSE Tecnologia
IBM mobile strategy at Innovate 2012
The Mobile Way Brochure
Ad

Similar to Securing Salesforce Mobile SDK Apps with Good Dynamics (20)

PDF
Symantec Enterprise Mobility - Mobile World Congress February 2012
PDF
Mobile Application Security
PDF
Symantec Enterprise Mobility Vision May 2012
PPTX
Citrix synergy 2012 debrief
PDF
Jerry Romanek series mobile development 2012 year end review
PDF
When Mobile (Android) met Cloud
PDF
Kony Mobile App Mgmt
PDF
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
PDF
Ibm fiberlink analyst presentation nov 13 final
PDF
Empower Enterprise Mobility with Microsoft EMS
PPTX
CA Management Cloud - Enterprise Mobility
PPTX
Meap and business platforms
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
PDF
Five things we have learned about mobility from our clients -- IBM, Alistair ...
PDF
MobileIron's Enterprise Solution for Mobile Web Browsing
PPT
Rational federal symposium mobile development in government
PDF
Securing Mobile Apps: New Approaches for the BYOD World
PPTX
Workshop 12-06 - Architectures for Enterprise Mobile Applications
PDF
03 put your business in motion become a mobile enterprise icty
Symantec Enterprise Mobility - Mobile World Congress February 2012
Mobile Application Security
Symantec Enterprise Mobility Vision May 2012
Citrix synergy 2012 debrief
Jerry Romanek series mobile development 2012 year end review
When Mobile (Android) met Cloud
Kony Mobile App Mgmt
Arrow ECS/IBM Partner Jam – MobileFirst – A BP’s Perspective - David Peacock...
Ibm fiberlink analyst presentation nov 13 final
Empower Enterprise Mobility with Microsoft EMS
CA Management Cloud - Enterprise Mobility
Meap and business platforms
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Five things we have learned about mobility from our clients -- IBM, Alistair ...
MobileIron's Enterprise Solution for Mobile Web Browsing
Rational federal symposium mobile development in government
Securing Mobile Apps: New Approaches for the BYOD World
Workshop 12-06 - Architectures for Enterprise Mobile Applications
03 put your business in motion become a mobile enterprise icty
Ad

Recently uploaded (20)

DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
Amazon (Business Studies) management studies
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Types of control:Qualitative vs Quantitative
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
A Brief Introduction About Julia Allison
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Business Ethics - An introduction and its overview.pptx
DOCX
Business Management - unit 1 and 2
PDF
IFRS Notes in your pocket for study all the time
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPT
Chapter four Project-Preparation material
unit 1 COST ACCOUNTING AND COST SHEET
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Chapter 5_Foreign Exchange Market in .pdf
New Microsoft PowerPoint Presentation - Copy.pptx
Amazon (Business Studies) management studies
Deliverable file - Regulatory guideline analysis.pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Types of control:Qualitative vs Quantitative
Power and position in leadershipDOC-20250808-WA0011..pdf
WRN_Investor_Presentation_August 2025.pdf
HR Introduction Slide (1).pptx on hr intro
Nidhal Samdaie CV - International Business Consultant
A Brief Introduction About Julia Allison
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Business Ethics - An introduction and its overview.pptx
Business Management - unit 1 and 2
IFRS Notes in your pocket for study all the time
340036916-American-Literature-Literary-Period-Overview.ppt
Probability Distribution, binomial distribution, poisson distribution
Chapter four Project-Preparation material

Securing Salesforce Mobile SDK Apps with Good Dynamics

  • 1. Securing Salesforce Mobile SDK Apps with Good Dynamics Dimitri Volkmann, Good Technology, VP Product Strategy @dimiexter
  • 2. Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of intellectual property and other litigation, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-Q for the most recent fiscal quarter ended July 31, 2012. This documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward- looking statements.
  • 3. Dimitri Volkmann VP, Product Strategy Good Technology dvolkmann@good.com
  • 4. Trends: Apps & BYO 550 K Apps in the Apple App store, 25B 150.8 M Corporate-liable devices expected to downloads as of March 5, 2012 ship by 2015 400 K Apps in the Android marketplace, 11B 182.4 M downloads Employee-liable devices expected to ship by 2015 Worldwide Business Use Smartphone 2011 – 2015 Forecast and Analysis, September 2011 (Stephen Drake, Stacy Crook, Ramon Llamas) BI Intelligence for tablets data, 2 http://148apps.biz/app-store-metrics/ (January 16, 2012) for apps data, 3 http://www.apple.com/pr/library/2011/12/12Apples-Mac-App-Store-Downloads-Top-100-Million.html for downloads data, 4 http://www.distimo.com/blog/2012_01_google-android-market-tops-400000-applications/ for apps data, 5http://www.zdnet.com/blog/hardware/android-markets-10-billion-downloads/17015?tag=content;siu-container ©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 4
  • 5. Protecting Enterprise Data: Security and Compliance Encryption Compliance & Policies BYO and App Store DLP (Data Loss Prevention) 1 1 2 2 3 3 Receive via Open and edit in Store unencrypted native email 3rd party editor locally or cloud @
  • 6. Solutions to protect data Mobile Web Device Containers Virtual Desktop Management (MDM) Control Control No the the Data! Device App/Data
  • 7. Pros & Cons Mobile Web Device Containers Virtual Desktop Management (MDM) + No data + Leverage existing + Leaves Device + Leverage existing practices intact for BYO infrastructure + Separate clearly Personal/Enterprise - Limited access to - Limited by Device + Not Device Device resources OS, inconsistent dependent - Constrains User - Constrains BYO use Experience case - Requires new - No offline scenario approach
  • 8. Good Technology Product Portfolio  BYOD  Security  Productivity  Collaboration  Management  Innovation Business Process Good Mobile Manager Collaboration Centralized & Productivity Good For Enterprise Management 3rd Party Apps Enterprise Apps Applications Collaboration Foundational Development Platform Set Policies Secure, Trusted Mobile Secure AppKinetics Certified NOC Secure Scalability Provision Devices Infrastructure Container Security Transport Mutiplatform Support Distribute Apps
  • 9. The Good Container Approach • Encryption (AES 256) • Secure back-end connectivity • Container level Policies & Compliance  Restrict ‘open with’, cut/copy/paste, and iCloud sync  Application level password  Remote wipe of the container  Detect jail-broken/rooted device • Additional Application Services • Push, Inter-container interop, Collaboration
  • 10. A Container, not A Silo Basic Good Dynamics Containers AppKinetics TM Non secure, OS-based, Data flow or Exchange Secure Good Docs Mobile Messaging
  • 11. Good Dynamics Components Client Libraries SDK and APIs Security and Application Services Good Control Management: Policies, Compliance, Users access to Apps Good Infrastructure Servers and NOC for Security and Management Services
  • 12. Mobile Application Development with Good Dynamics Benefits No coding encryption Compliance and Policies handled by and secure back-end the framework access Value added services Secure Storage fasten development Secure Enterprise back-end access App level management, BYO Interoperability between containers, friendly client side single sign on Eco-system of ISVs and SIs Services
  • 15. Mobile App Development for Salesforce Native Hybrid Web Good Technology Solutions Good Dynamics GFE Secure Good Dynamics Platform & Browser Platform & SDK PhoneGap plug-in container
  • 16. Sample #1: How to Secure Storage ? Native (iOS) Hybrid iOS Native call: NSString* str = @"file contents"; Local File Usage: NSData* contents = [str fileEntry.createWriter(success, fail); dataUsingEncoding:NSUTF8StringEncoding]; … writer.onwriteend = function(evt) {…}; [contents writeToFile: @"sample.txt" atomically: NO]; writer.write(“ file text contents ”); GD call: NSString* str = @"file contents"; NSData* contents = No code changes required, [ dataUsingEncoding:NSUTF8StringEncoding]; [GDFileSystem the plug-in uses GD Libraries writeToFile: contents name:@"sample.txt" error:&err];
  • 17. Sample #2: Enforce Custom Policies Native (iOS) Hybrid Retrieve the policies (defined by admin in the GC) GDiOS* library = [GDiOS sharedInstance]; GDApplication.getApplicationConfig NSDictionary *policy = [library getApplicationPolicy]; (success, fail); if ([[policy valueForKey:@"copyPasteOn"] … isEqualToString:@"false"]) {…}; var config = JSON.parse(result); if(config[“copyPasteOn”] === “false”) {…} Policy enforcement to be implemented by the developer
  • 18. Developers: Next Steps Web Apps – now with GFE Secure Browser Native Apps – now with GD Hybrid Apps – PhoneGap plug-in – in Good Roadmap Good Dynamics Network https://begood.good.com/community/gdn-welcome!input.jspa

Editor's Notes

  • #5: Audience Poll: How many of you have an active BYOD program ? How may are planning one within 12 months ? How many do not explicitly have one ? How many of you have deployed mobile Apps ? 1- 5 ? 5 – 10 ? more than 10 ? Do not know what end-users are doing ?
  • #7: Audience poll: How many of you have deployed Web (in browser Apps) ? Remote desktop ? MDM ? Containers ?
  • #9: [BUILD SLIDE] The good product portfolio provides a complete mobility solution. First, we support the most popular mobile devices on the market today. [CLICK] We provide a trusted mobile infrastructure, including a secure container, AppKinetics, military grade security, our trusted NOC, secure transport, and high scalability. [CLICK] We provide a foundational development platform, Good Dynamics, which provides you a way to secure and manage your mobile applications. [CLICK] We provide collaboration applications through Good for Enterprise, and business process and productivity apps through our ISVs and enterprise developers. [CLICK] And finally, we offer Good Mobile Manager, the toolset necessary to complete your enterprise mobility management solution.
  • #12: [BUILD SLIDE] So when we look at how Good Dynamics works with an enterprise/isv application, there’s really several major components: [CLICK] The Good Security and Management Infrastructure that provide the hooks for client libraries to leverage the power of Good Dynamics. [ CLICK] The Good Dynamics Client Libraries & APIs – resources and APIs that enterprise developers/ISVs can integrate into their application code. That’s really important to note. I mentioned on a previous slide the issue that a development manager has to face – hiring that killer coder who doesn’t know anything about security…well, now he can hire the killer coder, as security is handled by Good Dynamics! [CLICK] There’s the actual mobile application – untouched except for the set of APIs we just talked about. [CLICK] All of this is managed through Good Control - a c entralized web-based management GUI for IT Administrator to administer policies & manage users’ access to applications. This console is really the key to the power of Good Dynamics – a single point of administration of ALL Good Dynamics-enabled applications Let’s take a slightly deeper look at how this ties together…