android m: new features for feasting on your data

23
© 2015 IBM Corporation Android M New Features for Feasting on Your Data Jared Solomon QA Engineer IBM Security | June 4, 2015

Upload: maas360-by-fiberlink

Post on 05-Aug-2015

84 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

1 © 2015 IBM Corporation

Android M New Features for Feasting on Your Data

Jared Solomon QA Engineer

IBM Security | June 4, 2015

Page 2: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

2

Agenda

§  A Brief History of Android

§  Coming Soon to a Phone Near You – New Features in M

§  What Else is New? – Other New Google Announcements

§  Enterprise Security

§  Q&A

Page 3: Android M: New Features for Feasting on Your Data

3 © 2015 IBM Corporation

A Brief History of Time Android From C to M

Page 4: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

4

Release History

§  Cupcake 1.5 – April 2009

§  Donut 1.6 – September 2009 §  Eclair 2.0 – October 2009

§  Froyo 2.2 – May 2010

§  Gingerbread 2.3 – December 2010

§  Honeycomb 3.0 (Tablets only) – February 2011

§  Ice Cream Sandwich 4.0 – October 2011

§  Jelly Bean 4.1 – July 2012

§  Kit Kat 4.4 – October 2013

§  Lollipop 5.0 – November 2014 §  M – Q3

Page 5: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

5

Where’s the Snacktastic Name?

§  Name will be announced at official release

§  Current version is an incomplete preview

Page 6: Android M: New Features for Feasting on Your Data

6 © 2015 IBM Corporation

Coming Soon to a Phone Near You New Features in M

Page 7: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

7

Better Screen-Off Battery Life

§  Doze uses the device accelerometer to detect when the device is not being used –  Over time, restricts background tasks and data –  Will still respond to alarms and high priority

messages –  Normal behavior resumes when device is plugged

in or moved

§  App Standby determines what apps haven’t been used in a while –  Restricts background data for these apps –  Normal behavior resumes when app is launched or

device is plugged in.

Page 8: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

8

Auto Backup for Apps

§  The device will now automatically back up data for the user’s app

§  Data is stored in the user’s Google Drive account –  Doesn’t count against storage space

§  Data is restored when the app is reinstalled, either on the original device or a new one

§  Backups run every 24 hours over WiFi while charging

Improved Volume Controls §  Expanded Volume Control Panel

–  Quick access to Media and Alarm Volume §  Silent Mode Improvements

–  New “Alarms Only” Mode –  “Alarms Only” is default

§  New “Do Not Disturb” Quick Toggle

Page 9: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

9

App Permissions §  Apps request permissions when they need them §  No longer have to accept a laundry list of permissions

during installation §  Can be revoked at any time §  Available for apps made for M §  “Legacy Apps” can have permissions revoked

Biometric Security

§  Official support for Fingerprint scanners §  Unlock your device or your app

Page 10: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

10

Google Now on Tap

§  New contextual awareness for Google Now §  Aware of information on your screen §  Information that’s immediately relevant §  Simple to activate

Page 11: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

11

Chrome Integration

§  Chrome now supports Custom Tabs §  Use Chrome as in-app browser §  Add your own options §  Bring Chrome functionality to your app

Page 12: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

12

Android For Work Enhancements

§  Read-Only Wi-Fi configurations

§  Corporate app network usage visibility

§  Unified VPN app configuration –  Cisco, F5, Pulse, GlobalProtect

§  Enterprise Contacts integration

§  Corporate Owned Single Use (COSU) devices can be quickly configured to be locked to single app

§  Remote update management – apps and system

Page 13: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

13

Bug Fixes!

§  According to Google, over 1000 bugs have been resolved in this release

§  Smoother, more reliable experience

Page 14: Android M: New Features for Feasting on Your Data

14 © 2015 IBM Corporation

What Else is New? New in Android, and Not Just M

Page 15: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

15

Android Wear

§  Wi-Fi Support §  Google Maps on your watch §  Improved UI navigation

–  Gestures and Workflows §  Always On Apps §  Emoji Support

Page 16: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

16

Chrome Smart Lock

§  Password sharing between mobile and PCs §  Save password on your PC §  Automatic sign in for apps on mobile

Page 17: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

17

Google Photos

§  Unlimited High Quality Photo Backup

§  Browsing Improvements –  View by Moment, Day, or Month –  Pinch to Zoom –  Drag to select

§  Automatic Categorization –  Group by person –  Group by places –  Group by things

•  Types of animals •  Types of vehicles •  Types of landscapes •  Food

§  Improved Sharing

Page 18: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

18

Android Pay

§  Go to the store. Use your phone to buy things

§  Easily shop online §  No longer uses Virtual Mastercard §  New token-based authentication. Vendors

do not get your credit card info.

Page 19: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

19

Project Brillo

§  Android for devices that aren’t phones §  “Internet of Things” §  Control other devices with your phone

–  Unlock doors –  Control lights –  Turn off the oven –  And more!

Page 20: Android M: New Features for Feasting on Your Data

20 © 2015 IBM Corporation

Enterprise Security & Development What Do We Need to Worry About?

Page 21: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

21

What We Need to Prepare For

§  App Backup –  Data is encrypted, but still uploaded –  Issues restoring data on certain apps

§  Runtime Permissions –  Function properly without certain permissions –  Can we enforce required permissions?

§  Doze and App Standby –  How will this impact your app performance?

§  Fingerprint Scanner –  Passcode concerns

§  New OS Version –  Making sure everything else still works

Page 22: Android M: New Features for Feasting on Your Data

22 © 2015 IBM Corporation

Questions & Answers

Page 23: Android M: New Features for Feasting on Your Data

© 2015 IBM Corporation

IBM Security

23

www.ibm.com/security

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.