Sie sind auf Seite 1von 25

Customer Challenges and Deployment Solutions

James Dempsey, Business Development Manager, Enterprise Panasonic Solutions for Business

The tablet market is one of the fastest growing ever


Worldwide Tablet Shipments

Source: Infinite Research, 2012

The tablet market is one of the fastest growing ever


Total Cumulative Shipments of Gadgets in the First Five Years of Product History (millions) Tablets (Base Case)

Cell Phones

MP3 Players Notebooks

Source: Morgan Stanley Research; Gartner, April 2011; IDC, 2011

Consumer tablets were created for the perfect world

The use of tablets is spreading to the enterprise


Currently
21%
Purchase for Employees

In One Year

33%
Allow EmployeeOwned Tablets

71%
Do Not Allow
8%

Do Not Allow

51%
Purchase for Employees

16%
Allow EmployeeOwned Tablets

Source: Morgan Stanley Research; Alphawise, 2011

Tablet limitations for enterprise


Fragility Poor Daylight Viewability Lack of Ports Inaccessible Battery Closed Software

IT Control & Corporate Security Standard Warranty

Temperature Sensitivity

Enterprise tablets are for the real world

Enterprise tablet considerations

Durability

Functionality

Security

Manageability

Serviceability

Enterprise tablet considerations

Durability

Functionality

Security

Manageability

Serviceability

Rugged tablets can withstand spills, drops, rain and dust

Enterprise tablet considerations

Durability

Functionality

Security

Manageability

Serviceability

Incorporate high screen brightness to ensure full viewability

Integrated stylus enhances functionality

Built-in cradle for tablet pen

2011 BizTechResearch survey found

74% of healthcare
executives and senior IT management agree: consumer-grade tablets present challenges for entering data into enterprise applications

Enterprise tablet considerations

Durability

Functionality

Security

Manageability

Serviceability

Whats lacking in consumer tablets


Antivirus/Malware Protection Software Encryption Embedded Hardware Encryption Network Proxy Settings

Enhanced VPN

Root Protection
Trusted Boot Dual-Factor Authentication Kensington Cable Lock Slot

Enterprises should look for hardware security embedded in processor

Dedicated Application Processor


Dedicated Application Processor

Dedicated Security Processor


High security operation
Reduces application processor overhead

Embedded Security
User Authentication: Trusted Boot Data Encryption: 16GB flash Network Security: Strong key management by wireless Trusted Module, VPN

Security standard compliance


LEVEL 1
Security Software
The lowest level of security No physical security mechanisms are required in the module

LEVEL 2
Encrypting HDD
Tamper-evident physical security or pick-resistant locks

LEVEL 3
Security Software
Tamper-resistant physical security

LEVEL 4
Security Software
Physical security provides an envelope of protection around the cryptographic module

Trusted boot prevents tampering


Image is digitally signed for protection Digital signature is encrypted for protection Image validation is performed prior to boot of OS If tampering of image is detected, the boot process halts, preventing access to data

Virus Checker Data Encryption Trusted Boot (Prior to OS boot)

Enterprise tablet considerations

Durability

Functionality

Security

Manageability

Serviceability

Mobile device management (MDM) solution


BENEFITS HARDWARE SUPPORT FOR MDM

Increased device control & security

Pre-installed components
Low level device controls

Reduced support costs


Minimize downtime

Enterprise tablet considerations

Durability

Functionality

Security

Manageability Serviceability

Serviceable batteries maximize hardware investment

Serviceable Battery Compartment

VDC Research study found

70% of overall cost


of a device occurs after initial purchase, relating to support, productivity loss, downtime costs and lost revenue streams

Acquisition & Deployment

30%

Operations & Downtime

70%

Questions?

James Dempsey, james.dempsey@us.panasonic.com

Das könnte Ihnen auch gefallen