Presentation is loading. Please wait.

Presentation is loading. Please wait.

Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.

Similar presentations


Presentation on theme: "Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania."— Presentation transcript:

1 Šarūnas Končius sarunask@microsoft.com Technology Strategist of Microsoft Microsoft Lithuania

2 Main trends in technologies

3 Technology trends: Waze

4 Internet of Things Mobility Cloud computing Social networks Big data

5 Today we already live in the world where mobility and cloud computing is a priority

6 Mobility has become a standard Permanent internet connection influences the experience of household users Changes in the style of work Mobile household user 2 out of 3 household users use their smart phone to look for information about goods and services at least 3 to 4 days per week. In 2016, tablets and smart phones will be carried by 1.4 billion persons. 29% of employees work at the time convenient, from different places, have 3 and more devices and use many applications. Almost 80% of employees spend at least some of their working time working outside their office. Cloud computing Devices and mobility Social networksBig dataSafety and privacy

7 Change in the expectations of ordinary employees 7

8 Diversity of devices is changing the attitude of companies: BYOD 8

9 Diversity of devices shatters the standard-based corporate IT infrastructure. Devices Installation and management of applications in different platforms is difficult. Applications Data Users must work efficiently following compliance standards and reducing risk. Users expect to be able to work at any place with full access to all resources. Users Management of User IDs Data protectionManagement of devices Management of applications IT Department needs It is difficult for companies to manage multiple devices

10 User data Lost Company's data Remote App How companies protect their data in devices Data in the server Connection Disconnected Company's data Remote App Rules Lost Company's data Remote App Rules User information Disconne cted Personal Apps and Data IT Department should offer a secure solution to protect sensitive data. The user may access company's data on any device and from any place. Custom deletion only erases the company's application, data and rules Full deletion erases all data – both the company's and user's Deletion may be done by the user or by the administrator Secret data may be encrypted or stored outside the device

11 Threat for persona data 11

12 The first story: Google and traffic lights in Vilnius 12 In response to the article, Google representatives promptly released a reply to the allegations that their service Traffic has been using the data of other systems. “The company Google does not use the data of either Vilnius city or any other system developed and maintained by the money of Lithuanian taxpayers to inform drivers via its recently launched apps Traffic, which informs about the traffic conditions in Vilnius. The apps Traffic operates on the basis of the data collected by the technical solutions implemented by the company itself. Likewise, the company Google is not intending to use the data of the system to inform drivers of Vilnius city in the future. None of the products and services of the company Google is maintained or otherwise supported by the money of Lithuanian taxpayers," said Šarūnas Pundzius from the public relations company that represents Google.

13 The second story: "good" applications 13

14 The third and fourth stories: bitter goodbye Two different companies Each of the companies fired one of their employees for faults Both employees had personal smart phones The IT unit of one company has only blocked the dismissed employee's access to the e-mail server because the company's lawyers did not allow to delete the contents of the smart phone The IT unit of the other company has fully erased the contents of the employee's smart phone as instructed by the company's lawyers who had the consent for this signed by the employee 14

15 How to protect personal data in a mobile device The manufacturers of a device, operational system, service and application should inform clearly when and how they collect and use information Install applications only from reliable sources Look carefully what information is requested by the application being installed and think critically for what purposes such data will be used by the apps When in doubt, do not install or use the application The best weapon is your head 15

16


Download ppt "Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania."

Similar presentations


Ads by Google