Santhosh NairVice President IoT
Safe Harbor Statement
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding MobileIron's revenue and other GAAP and non-GAAP financial metrics for the company's third quarter in 2015 and other statements regarding trends in the company's business, including statements regarding MobileIron's GAAP and non-GAAP revenue and operating expense targets, growth in our customer base, increased customer adoption, and expected benefits from new product offerings and MobileIron’s partner ecosystem. There are a significant number of factors that could cause actual results to differ materially from statements made in this presentation, including MobileIron's limited operating history,quarterly fluctuations in MobileIron's operating results, MobileIron's need to develop new solutions and enhancements to compete in rapidly evolving markets, product defects, competitive pressures, customer adoption, changes by operating system providers and mobile device manufacturers, MobileIron's inability to manage growth, the quality of MobileIron support, MobileIron's reliance on channel partners and development of partner ecosystem.
Additional information on potential factors that could affect MobileIron's financial results is included in the company's SECfilings, including its most recent Form 10-K and Form 10-Q. MobileIron does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made.
Architecture for mobile security
Policy engine
Network gateway
Edge client
Architecture for IoT security
Network gateway
Policy engine
Edge client
IoT: the right fit for MobileIron
Policy engine
Customer requirements match our architecture
Target customers match our installed base
Routes to market
Network gateway
Edge client
Policy and Identity
EMM platform architecture
Apps@WorkEnterprise app store
Docs@WorkSecure content
Web@WorkSecure browsing
Help@WorkTroubleshooting
TunnelPer app VPN
Email+Secure email
AppConnect Ecosystem
Enablement Enforcement
Conditional Access Integration
Cloud Security
Policy and Identity
IoT platform architectureCloud Security
EdgeConnect• Client and AppConnect extension• Linux and other RTOSes• App updating and hardening controls• Sensor configuration• Connectivity and secure routing• Secure bus over local mesh
Next-gen policy engineHydra API (Q1-Q3)
o IoT scale o MQTT-basedo Data-level subscriptiono Policy integration
• API-based registrationo Non-standard OS
• Data-driven automation
Spigot framework (Phase II)• For direct connection from sensor
IoTgateway
Sensors
IoT application services (cloud)
IoT application services (on-prem)
• Private cloud (Azure, AWS)• Cert-based security• Identity awareness
• Intrusion detection• Anomaly detection (machine learning)• Multi-tenant public cloud
Sentry and Access
Devices Gateways Automation Big dataIngestion Action
End-to-end chain of trust
Enablement Enforcement
Conditional Access Integration
Products
Set endpoint policy
Ensure data security
Enforce endpoint or gateway compliance
EdgeConnect
H1 - 2017
Engineering for early field trials with G2K customers
H2 - 2017
Revenue-ready product
Apps / EMM
Growth catalysts
Cloud Security
Desktop Security
Desktop Security
Cloud Security
Apps / EMM
Growth catalysts
IoT
Why us, why now?
Growth in core EMM market
Improving financialsInnovation