SlideShare a Scribd company logo
NORTHERN TRUST




                                     Beyond the Wireless Tether
                                     An “Occasionally Connected” Architecture




     A Gartner Catalyst Case Study
     2012.08.20
     Christopher Price
     Vice President
     The Northern Trust Company
© 2012 Northern Trust Corporation                                         northerntrust.com
About me…


    Christopher Price
    Vice President, The Northern Trust Company
    cp68@ntrs.com


         Architecture and Innovation Team member
                 IT Standards and Guidance
                 Evaluation of New Technologies
                 R&D for High Value Projects
         At Northern Trust for 7 years, experience with:
                 Enterprise Architecture
                 Software Design and Development




2   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



          Background                     on Northern Trust
          Determining                  the Requirements
          Application               Architecture
          Infrastructure

          Security




3   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Northern Trust Overview

                                                  Founded in 1889, Northern Trust Corporation is a global
                                                  leader in asset servicing, asset management, wealth
                                                  management, and banking for personal and institutional
                                                  clients.




      Assets under custody
         US$4.6 trillion

Assets under management
     US$704 billion

             Banking Assets
             US$94 billion
*As of 30 June 2012


 4        “Beyond the Wireless Tether” - Gartner Catalyst 2012
Northern Trust’s Global Presence


                  Chicago (Corporate HQ)                   Abu Dhabi   Guernsey   London
                  Toronto                                  Amsterdam   Jersey     Luxembourg
                  New York                                 Dublin      Limerick   Stockholm


                                                                                        Bangalore
                                                                                        Beijing
                                                                                        Hong Kong
                                                                                        Melbourne
A network of offices                                                                    Singapore
 in 18 States and                                                                       Tokyo
 Washington D.C.




5   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



          Background                  on Northern Trust
          Determining                    the Requirements
          Application               Architecture
          Infrastructure

          Security




6   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Determining the Requirements

       Focus on what matters to clients, not on technology.
       Relationship          managers want latest mobile technology but need:
              All   data necessary to conduct meeting
              Minimal        distractions
              Ability     to work anywhere the client is located


                          Having “zero  bars”  shouldn’t  hinder  the  conversation!




7   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Business Requirements

        Need to avoid this situation….




    WELCOME - Today’s Agenda

     9am – 9:05am                      Attempt to connect to available Wi-Fi with incorrect settings
     9:05am – 9:15am                   Give up and struggle with slow 3G connection
     9:15am – 9:20am                   Locate presentation materials with assistance from help desk
     9:20am – 9:30am                   Diagnose problems with projector and screen
     9:30am – 10am                     Finally… Discuss client’s financial goals




8    “Beyond the Wireless Tether” - Gartner Catalyst 2012
Technology Requirements

       The two primary technology requirements...
          Disconnected               mode
             Maximize       time with client
               No connections to establish.
               No interruptions caused by poor reception, network outage, etc.
             Quick

               Highly responsive user interface by minimizing server requests.
               Not relying on slow connections to transfer large documents during meetings.
             Reach

            Client meeting location not bounded by reach of antennas.
            Want to accompany the client on their yacht? – No problem.
          Security
             Highly     sensitive client data being stored.
             Mobile     device more susceptible to loss and theft.
             Primarily     using untrusted networks.


9   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda


           Background                  on Northern Trust
           Determining                  the Requirements
           Application                  Architecture
           Infrastructure

           Security




10   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices

        “Got the requirements, let’s build a mobile app!” ...not so fast.

             Need to establish formal guidance for building mobile solutions at
              Northern Trust with help from vendors, consultants and peers.
             The result: Northern Trust Mobile Strategy and Reference Architecture

                                                      Strategy contains guidance for management:
                                                      • Definition of mobile apps, devices and content
                                                      • Governance recommendations
                                                      • Usage Policies
                                                      • Risks
                                                      • Etc.

                                                      Architecture contains developer guidance:
                                                      • Style of app: web, native, or hybrid
                                                      • Security
                                                      • Device support
                                                      • Service development
                                                      • Etc.


11   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices


      First major decision…web, native or hybrid*?

                                      Web/Hybrid            Native




* Defined as a thin native wrapper around a primarily HTML/JS view. Hybrid apps fall within a
spectrum between web and native depending upon how many native features are utilized.

12   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices


      Decision: Native Application Architecture

          1) Secure offline operation
             Secure          local storage
               “Why  not  HTML5  local  storage?”
                Size restrictions (app is a storage hog!)
                Reliability – browser cache easily erased
                Security concerns
          2) Superior presentation
            Better         appearance
            Greater           app awareness
          3) Performance
            Fewer          round-trips to server
            Quicker           rendering
13   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices

      BUT: Typically don’t recommend native at Northern Trust

           Web         or hybrid apps are preferred because:
             Cheaper            to build with in-house web expertise
             Majority         of effort is reusable
             Can        be indistinguishable from native with HTML5/JavaScript
             Quicker           to deliver new features




14   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Architectural Choices




                                                            Gartner, 2012




15   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda


           Background                   on Northern Trust
           Determining                  the Requirements
           Application               Architecture
           Infrastructure

           Security




16   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure




           1. User places documents in folder on internal portal
           2. Synchronization initiated by user from iOS app while online
           3. Middleware sends updates back and forth between mobile
                app and source systems.

17   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



          Decision: iOS Platform Only
           Internal           application. Control of device choice
           Users           more familiar with Apple products. Less training.
           Fewer           platform specific updates.

                              2012 Market share




                                                       Apple
                                                       Android
                                                       Microsoft
                                                       Other




     http://www.gartner.com/it/page.jsp?id=1980115


18      “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



        Decision: Vended service gateway
         Layer         7 is edge security for external services
         Integration             with authentication providers
         Speaks            multiple security protocols
         Custom            solution added no value




http://www.gartner.com/technology/reprints.do?id=1-17Q04QM&ct=111019&st=sg

19    “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



      Decision: ReST over SOAP
       Lightweight         - important for mobile
       Heavier       SOAP difficult to handle on mobile client.
       Mobile      clients have APIs for handling basic URL calls
       Poor     web service support in iOS/Android unlike in Java or .NET




20   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Infrastructure



      Decision: Custom Middleware
       Purpose        – Extract data from source systems, feed to mobile client apps
       Why Custom?

        Anticipated consolidation within market for mobile middleware (MEAP)
        Cloud based solution not acceptable for use case
        Custom source system integration




21   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Agenda



           Background                  on Northern Trust
           Determining                  the Requirements
           Application               Architecture
           Infrastructure

           Security




22   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Security

          Decision: Plan for the worst with numerous security layers

          Over the wire
             OAuth          2.0
                Popular standard for cloud APIs
                Open to federation in future with 3rd parties
                Easy to use with ReST services

             Two-factor
                Access token required due to sensitivity of data
                RSA SecurID Software Token + iOS SDK chosen for limited
                  user involvement
                Better user experience, but still as secure as physical token



23   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Security




          On device
             Mobile         Device Management (MDM)
                Passcode requirement
                Remote data wipe

             Local        Authentication
                Support offline identification of users
                Future SSO with all Northern Trust applications

             Local        Encryption
                Secure whether online or off
                Strongest available algorithms
                Double security – iOS platform and custom
24   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Summary



                                             Listen to your clients

                                             Define your Strategy

                                             Design for Resilience
                                                Go Web by default

                                                   Buy a Gateway

                                             Caution: Middleware
                                  Security: Plan for a worst case


25   “Beyond the Wireless Tether” - Gartner Catalyst 2012
Questions?




                         Thank you for attending!
26   “Beyond the Wireless Tether” - Gartner Catalyst 2012

More Related Content

PPTX
Customer Presentation - Northern Trust
Splunk
 
PPTX
Big data in Private Banking
Jérôme Kehrli
 
PDF
RSA Presentation - 5 Steps to Improving PCI Compliance
EMC
 
PDF
Keyrus US Information
Julian Tong
 
PDF
Inventory and Discovery: How to Take Charge of “What’s Out There”
Enterprise Management Associates
 
PDF
Predictive Analytics at the Speed of Business
Decision Management Solutions
 
PPTX
Aveshka Overview
Aveshka
 
PPTX
Wsta event 3 19-2015.v6
Kevin Petrie
 
Customer Presentation - Northern Trust
Splunk
 
Big data in Private Banking
Jérôme Kehrli
 
RSA Presentation - 5 Steps to Improving PCI Compliance
EMC
 
Keyrus US Information
Julian Tong
 
Inventory and Discovery: How to Take Charge of “What’s Out There”
Enterprise Management Associates
 
Predictive Analytics at the Speed of Business
Decision Management Solutions
 
Aveshka Overview
Aveshka
 
Wsta event 3 19-2015.v6
Kevin Petrie
 

What's hot (20)

PPTX
Innovation Around Data and AI for Fraud Detection
DataStax
 
PPTX
How Startups can leverage big data?
Rackspace
 
PDF
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Caserta
 
PPT
DLP
saurabh.sood
 
PDF
Demo Showcase: Graphs for Cybersecurity in Action
Neo4j
 
PPTX
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
PPTX
Lock it Down: Access Control for IBM i
Precisely
 
PDF
ZIGRAM Introduction July 2021
ZIGRAM
 
PPTX
ZIGRAM Internship Program Nov 2019
ZIGRAM
 
PPTX
SENTIENT ENTERPRISE
Teradata
 
PPTX
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist, LLC
 
PDF
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Enterprise Management Associates
 
PDF
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
PDF
Pivotal Digital Transformation Forum: Data Science
VMware Tanzu
 
PDF
Neo4j Aura Enterprise
Neo4j
 
PPTX
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Precisely
 
PDF
How to Avoid Pitfalls in Big Data Analytics Webinar
Datameer
 
PDF
JMR BITSHIFT Solution Overview 9-6-16
Incognate Limited
 
PPTX
Optimizing Regulatory Compliance with Big Data
Cloudera, Inc.
 
PDF
Trends in Government ICT - Chasing Data, Information, and Decision Support
Corporacion Colombia Digital
 
Innovation Around Data and AI for Fraud Detection
DataStax
 
How Startups can leverage big data?
Rackspace
 
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Caserta
 
Demo Showcase: Graphs for Cybersecurity in Action
Neo4j
 
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
Lock it Down: Access Control for IBM i
Precisely
 
ZIGRAM Introduction July 2021
ZIGRAM
 
ZIGRAM Internship Program Nov 2019
ZIGRAM
 
SENTIENT ENTERPRISE
Teradata
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist, LLC
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Enterprise Management Associates
 
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
Pivotal Digital Transformation Forum: Data Science
VMware Tanzu
 
Neo4j Aura Enterprise
Neo4j
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Precisely
 
How to Avoid Pitfalls in Big Data Analytics Webinar
Datameer
 
JMR BITSHIFT Solution Overview 9-6-16
Incognate Limited
 
Optimizing Regulatory Compliance with Big Data
Cloudera, Inc.
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Corporacion Colombia Digital
 
Ad

Viewers also liked (14)

PDF
The Northern Trust Difference
maturepalate
 
PDF
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
CA Technologies
 
PDF
Northern Trust
SociaLogic
 
PDF
Gartner - Sales opportunities for Exceptional People
S R
 
PPTX
Standard life gars
BerlinBear69
 
PPS
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD
 
PDF
BSAMMBO
Christian Heinrich
 
PPT
Drugstore.com Gartner Slides
RightNow Technologies
 
PPTX
Gartner Introduction
TulikaBalachander
 
PDF
Secure Coding for Java - An Introduction
Sebastien Gioria
 
PDF
Plannet Esolutions Limited Profile.
Divyansh Batra
 
PDF
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
PDF
Solution Blueprint - Customer 360
Vishal Shah, PMI Certified
 
PPTX
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
StandardlifeAEM
 
The Northern Trust Difference
maturepalate
 
Case Study: Williams Establishing a DevOps Model Based on the Gartner Layered...
CA Technologies
 
Northern Trust
SociaLogic
 
Gartner - Sales opportunities for Exceptional People
S R
 
Standard life gars
BerlinBear69
 
Siri ESTANDARD (Free-Thinking Education, Alternative-Attitudinal Philosophy)
Siri ESTANDARD
 
Drugstore.com Gartner Slides
RightNow Technologies
 
Gartner Introduction
TulikaBalachander
 
Secure Coding for Java - An Introduction
Sebastien Gioria
 
Plannet Esolutions Limited Profile.
Divyansh Batra
 
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
Solution Blueprint - Customer 360
Vishal Shah, PMI Certified
 
標準人壽My Smart Planner Android應用程式 - 投資組合及查看名單
StandardlifeAEM
 
Ad

Similar to Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile Access Gateway: Beyond the Wireless Tether: An “Occasionally-Connected” Architecture (20)

PDF
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Mohan Venkataraman
 
PDF
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Priyanka Aash
 
PDF
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
Enterprise Management Associates
 
PDF
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Open Networking Summits
 
PPTX
Siebel to Salesforce
Pactera_US
 
PDF
Journey to the Cloud
Pete Nieminen
 
PDF
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
PDF
Sphere 3D presentation for Credit Suisse technology conference 2014
Peter Bookman
 
PDF
DLT analytics and AI workshop 13 march 2019
Stavros Zervoudakis
 
PPTX
Benefits of Operating an On-Premises Infrastructure
Rebekah Rodriguez
 
PDF
Sukhbir jasuja digital_trends_11
Hellenic Professionals Informatics Society
 
PPTX
2012 RightScale Road Trip - San Jose
RightScale
 
PPTX
SDN a strategic assessment
stefriche0199
 
PDF
Cloud Roundtable
Internap
 
PDF
Cloud computing
Razib M
 
PPTX
Fosec2011 keynote address
threesixty
 
PDF
Simplify and secure your path to the multicloud future
MarketingArrowECS_CZ
 
PDF
Transforming enterprise network infrastructure with sd wan services
RehanShrivastav
 
PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
PPTX
Zero Trust Networks
Practical Code, LLC
 
Chainyard ref arch hyperledger global forum 2018 12-04 v0.97 ss
Mohan Venkataraman
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Priyanka Aash
 
How to Select a Next-Generation Packet Broker to Manage Digital Transformation
Enterprise Management Associates
 
Virtual Application Networks Innovations Advance Software-defined Network Lea...
Open Networking Summits
 
Siebel to Salesforce
Pactera_US
 
Journey to the Cloud
Pete Nieminen
 
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Peter Bookman
 
DLT analytics and AI workshop 13 march 2019
Stavros Zervoudakis
 
Benefits of Operating an On-Premises Infrastructure
Rebekah Rodriguez
 
Sukhbir jasuja digital_trends_11
Hellenic Professionals Informatics Society
 
2012 RightScale Road Trip - San Jose
RightScale
 
SDN a strategic assessment
stefriche0199
 
Cloud Roundtable
Internap
 
Cloud computing
Razib M
 
Fosec2011 keynote address
threesixty
 
Simplify and secure your path to the multicloud future
MarketingArrowECS_CZ
 
Transforming enterprise network infrastructure with sd wan services
RehanShrivastav
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Zero Trust Networks
Practical Code, LLC
 

More from CA API Management (20)

PDF
Api architectures for the modern enterprise
CA API Management
 
PDF
Mastering Digital Channels with APIs
CA API Management
 
PDF
Takeaways from API Security Breaches Webinar
CA API Management
 
PDF
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
CA API Management
 
PDF
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
CA API Management
 
PDF
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
CA API Management
 
PPTX
API Monetization: Unlock the Value of Your Data
CA API Management
 
PDF
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
CA API Management
 
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
CA API Management
 
PDF
Enabling the Multi-Device Universe
CA API Management
 
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
CA API Management
 
PDF
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
CA API Management
 
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
CA API Management
 
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
PDF
5 steps end to end security consumer apps
CA API Management
 
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
CA API Management
 
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
CA API Management
 
PPTX
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
CA API Management
 
PDF
Using APIs to Create an Omni-Channel Retail Experience
CA API Management
 
Api architectures for the modern enterprise
CA API Management
 
Mastering Digital Channels with APIs
CA API Management
 
Takeaways from API Security Breaches Webinar
CA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
CA API Management
 
API Monetization: Unlock the Value of Your Data
CA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
CA API Management
 
Enabling the Multi-Device Universe
CA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
CA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
5 steps end to end security consumer apps
CA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
CA API Management
 

Recently uploaded (20)

PDF
Doc9.....................................
SofiaCollazos
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Doc9.....................................
SofiaCollazos
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 

Northern Trust Case Study from Gartner Catalyst 2012 Featuring Layer 7 Mobile Access Gateway: Beyond the Wireless Tether: An “Occasionally-Connected” Architecture

  • 1. NORTHERN TRUST Beyond the Wireless Tether An “Occasionally Connected” Architecture A Gartner Catalyst Case Study 2012.08.20 Christopher Price Vice President The Northern Trust Company © 2012 Northern Trust Corporation northerntrust.com
  • 2. About me… Christopher Price Vice President, The Northern Trust Company [email protected]  Architecture and Innovation Team member  IT Standards and Guidance  Evaluation of New Technologies  R&D for High Value Projects  At Northern Trust for 7 years, experience with:  Enterprise Architecture  Software Design and Development 2 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 3. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 3 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 4. Northern Trust Overview Founded in 1889, Northern Trust Corporation is a global leader in asset servicing, asset management, wealth management, and banking for personal and institutional clients. Assets under custody US$4.6 trillion Assets under management US$704 billion Banking Assets US$94 billion *As of 30 June 2012 4 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 5. Northern Trust’s Global Presence Chicago (Corporate HQ) Abu Dhabi Guernsey London Toronto Amsterdam Jersey Luxembourg New York Dublin Limerick Stockholm Bangalore Beijing Hong Kong Melbourne A network of offices Singapore in 18 States and Tokyo Washington D.C. 5 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 6. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 6 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 7. Determining the Requirements Focus on what matters to clients, not on technology.  Relationship managers want latest mobile technology but need:  All data necessary to conduct meeting  Minimal distractions  Ability to work anywhere the client is located Having “zero  bars”  shouldn’t  hinder  the  conversation! 7 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 8. Business Requirements Need to avoid this situation…. WELCOME - Today’s Agenda  9am – 9:05am Attempt to connect to available Wi-Fi with incorrect settings  9:05am – 9:15am Give up and struggle with slow 3G connection  9:15am – 9:20am Locate presentation materials with assistance from help desk  9:20am – 9:30am Diagnose problems with projector and screen  9:30am – 10am Finally… Discuss client’s financial goals 8 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 9. Technology Requirements The two primary technology requirements...  Disconnected mode  Maximize time with client No connections to establish. No interruptions caused by poor reception, network outage, etc.  Quick Highly responsive user interface by minimizing server requests. Not relying on slow connections to transfer large documents during meetings.  Reach Client meeting location not bounded by reach of antennas. Want to accompany the client on their yacht? – No problem.  Security  Highly sensitive client data being stored.  Mobile device more susceptible to loss and theft.  Primarily using untrusted networks. 9 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 10. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 10 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 11. Architectural Choices “Got the requirements, let’s build a mobile app!” ...not so fast.  Need to establish formal guidance for building mobile solutions at Northern Trust with help from vendors, consultants and peers.  The result: Northern Trust Mobile Strategy and Reference Architecture Strategy contains guidance for management: • Definition of mobile apps, devices and content • Governance recommendations • Usage Policies • Risks • Etc. Architecture contains developer guidance: • Style of app: web, native, or hybrid • Security • Device support • Service development • Etc. 11 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 12. Architectural Choices First major decision…web, native or hybrid*? Web/Hybrid Native * Defined as a thin native wrapper around a primarily HTML/JS view. Hybrid apps fall within a spectrum between web and native depending upon how many native features are utilized. 12 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 13. Architectural Choices Decision: Native Application Architecture 1) Secure offline operation Secure local storage “Why  not  HTML5  local  storage?” Size restrictions (app is a storage hog!) Reliability – browser cache easily erased Security concerns 2) Superior presentation Better appearance Greater app awareness 3) Performance Fewer round-trips to server Quicker rendering 13 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 14. Architectural Choices BUT: Typically don’t recommend native at Northern Trust  Web or hybrid apps are preferred because: Cheaper to build with in-house web expertise Majority of effort is reusable Can be indistinguishable from native with HTML5/JavaScript Quicker to deliver new features 14 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 15. Architectural Choices Gartner, 2012 15 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 16. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 16 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 17. Infrastructure 1. User places documents in folder on internal portal 2. Synchronization initiated by user from iOS app while online 3. Middleware sends updates back and forth between mobile app and source systems. 17 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 18. Infrastructure Decision: iOS Platform Only  Internal application. Control of device choice  Users more familiar with Apple products. Less training.  Fewer platform specific updates. 2012 Market share Apple Android Microsoft Other http://www.gartner.com/it/page.jsp?id=1980115 18 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 19. Infrastructure Decision: Vended service gateway  Layer 7 is edge security for external services  Integration with authentication providers  Speaks multiple security protocols  Custom solution added no value http://www.gartner.com/technology/reprints.do?id=1-17Q04QM&ct=111019&st=sg 19 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 20. Infrastructure Decision: ReST over SOAP  Lightweight - important for mobile  Heavier SOAP difficult to handle on mobile client.  Mobile clients have APIs for handling basic URL calls  Poor web service support in iOS/Android unlike in Java or .NET 20 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 21. Infrastructure Decision: Custom Middleware  Purpose – Extract data from source systems, feed to mobile client apps  Why Custom? Anticipated consolidation within market for mobile middleware (MEAP) Cloud based solution not acceptable for use case Custom source system integration 21 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 22. Agenda  Background on Northern Trust  Determining the Requirements  Application Architecture  Infrastructure  Security 22 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 23. Security Decision: Plan for the worst with numerous security layers Over the wire OAuth 2.0 Popular standard for cloud APIs Open to federation in future with 3rd parties Easy to use with ReST services Two-factor Access token required due to sensitivity of data RSA SecurID Software Token + iOS SDK chosen for limited user involvement Better user experience, but still as secure as physical token 23 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 24. Security On device Mobile Device Management (MDM) Passcode requirement Remote data wipe Local Authentication Support offline identification of users Future SSO with all Northern Trust applications Local Encryption Secure whether online or off Strongest available algorithms Double security – iOS platform and custom 24 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 25. Summary Listen to your clients Define your Strategy Design for Resilience Go Web by default Buy a Gateway Caution: Middleware Security: Plan for a worst case 25 “Beyond the Wireless Tether” - Gartner Catalyst 2012
  • 26. Questions? Thank you for attending! 26 “Beyond the Wireless Tether” - Gartner Catalyst 2012