Hi, I'm Stuart Lisk, Senior Product Manager for the Secure Mobile Access product from Dell. Today, I want to talk to you about being able to leverage the use of your employee's personal devices in order to get access to the corporate resource in a secure manner.
Utilizing personal devices opens up all kinds of security risk, as you well know. And today, one of the best ways to do that is through the use of a per app VPN solution, which is exactly what Secure Mobile Access is all about.
Unfortunately however, many of the solutions that are out there today require you to utilize an SDK-- so that means doing development and changing the app itself-- wrapping that application-- which means it require scripting in order to identify the app that can access the VPN, so the employees can get access to the corporate resource. And that only delays the deployment, as well as costs a lot of resources, including money. Well, with Secure Mobile Access from Dell, it's very simple. All you have to do is register that app. That gives you almost a zero day deployment.
Let me show you how easy it is to register the app. We're moving to the management console to take a look at how easy it is, frankly, to actually identify the applications that are going to access the VPN for the corporate resources. But I'm going to use Chrome as the application. I'm identifying the actual platform-- you see Chrome is serving as a browser.
And what's important here, is the fact that not only are you able to identify the application, but you're also able to identify the versions of each of the applications. And this is important because as new versions come out-- you know how frequently versions of applications come out, whether they're those that you do internally as a custom app, or those that you might be utilizing such as a browser-- applications change on an ongoing basis. So you want to have the ability to actually vet those new versions to make sure they're actually working the way you want them to before you make them readily available to your employee base.
So you'll notice I've got the versions themselves. We've identified the application ID that comes from the actual store. So whether it's a Play Store or the Apple Store-- they come right from those stores because these are mobile apps. And then you also have the signature ID that is specific to that particular version. So once you've identified, of course, the application and the platforms they're going to run on, it's really important-- I want you to take a look at identifying what devices that these applications can run on.
So for this host, called Indigo, I've been able to identify two zones. One is a device on which is the manage zone. These are the actual devices that the company is supplying the employee. In this case, we're seeing the company is providing Window devices, Window phones as an example to the employees to use. And so you'll have a set of policies, security policies, that will pertain just to those Windows corporate-owned devices.
But really where BYOD comes in, a real value, of course, is that you can also allow employees to utilize their own personal device. And in this case, the company is saying, I'm going to allow Android and Apple devices. Which is great, because a lot of people love using their iPads, as an example. Or they like using some sort of an Android tablet, perhaps. And they can do that on any of these applications.
So in this example, I got Firefox, Chrome, our new container technology called Dell Mobile Workspace. And so, on these device, using any of these applications, that employee can get access to the Indigo corporate resource.
And, as I mentioned about the BYOD policies being jurisdictional in nature. So that if you're an enterprise and you've got offices throughout the world, Germany's consumer right policies are going to differ than France, or the US. And what's even more pertinent, is that within the United States alone, every state within the Union can have its own set of laws and regulations that's related to actual consumer rights. And so you'll need to have the ability to set up BYOD policies for each and every one of those jurisdictions, perhaps, so that when the employees take a look at those policies, they are specific to them.
So in this example, I'm just showing you the fact that you have a BYOD policy that you've entered-- and of course, this usually comes from your legal department-- and you can see here that this is the US one in the example for the finance group and the United States. And this is the policy that's going to appear for anyone within the US within the finance department that belongs to that particular community.
And now that you see how easy it is actually register the app, as well as create that BYOD policy, let's take a look at the employee experience on their tablet.
Now, as you're [INAUDIBLE], we'll go ahead and use the Dell Venue 8 tablet. It's an Android device by Dell. I'm going to go ahead and initiate the client called Mobile Connect. That's standard on all our network security products. Basically what I'm doing there is I'm going to go ahead and initiate the VPN.
I'll go ahead and login.
The first thing you're going to see of course, is the actual BYOD policy that is specific to me. So you happen to see-- of course, I showed it to you a moment ago in the management console. It's identified for US. I get to read this policy. I can decline it or accept it. I'm going to go ahead and accept it.
And then what you'll notice, of course, is the list the applications that are authorized for me