We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRachel Hudspeth
Modified over 2 years ago
© 2012 IBM Corporation IBM Endpoint Manager for Mobile Devices Mobile Device Management
© 2012 IBM Corporation 2 Android and iOS devices have quickly penetrated the enterprise, bringing productivity gains, along with increased risk and cost IBM Endpoint Manager for Mobile Devices delivers strong MDM capabilities in an infrastructure that enables unified management of all enterprise devices – desktops, laptops, servers, smartphones, and tablets IBM is uniquely positioned to deliver end-to-end app and mobile device lifecycle management with Mobile Application Development Platform (MADP), Mobile Device Management (MDM), and Telecom Expense Management capabilities Executive Summary
© 2012 IBM Corporation 3 Android and iOS accounted for 79% of all smartphone shipments Source: Gartner 2012; does not include media tablets Share of global Q smartphone sales to end users, by OS
© 2012 IBM Corporation 4 Mobile devices magnify existing challenges and also pose unique ones that significantly disrupt traditional management paradigms Traditional Mgmt ModelNew Device Mgmt Paradigm Enterprises provide all equipmentEmployees bring personal devices (BYOD) Small set of supported platforms / modelsMany different manufacturers / models IT initiates and manages upgradesOS/app upgrades managed by carriers, OEMs, users IT tightly controls apps and securityUsers control their own devices Options for IT departments Dont allow mobile devices because they are too hard to manage Allow unmanaged and insecure mobile devices Invest in tools to secure and manage devices
© 2012 IBM Corporation 5 IBM is uniquely positioned to deliver end-to-end app and mobile device lifecycle management Key Capabilities Strategy, planning and implementation Mobile-enabled solutions including analytics, commerce, and social business Mobile as a service Key Capabilities Mobile web, hybrid and native app development Enterprise data, service, and application integration Enterprise wireless networking Key Capabilities Mobile lifecycle management Device analytics and control Secure network communications & management Build & Connect Manage & Secure Extend & Transform
© 2012 IBM Corporation 6 Security & Management Challenges Potential unauthorized access (lost, stolen) Disabled encryption Insecure devices connecting to network Corporate data leakage Mail / Calendar / Contacts Access (VPN / WiFi) Apps (app store) Enterprise Apps iCloud iCloud Sync iTunes Sync Encryption not enforced End User VPN / WiFi Corporate Network Access Managing Mobile Devices – The Problem
© 2012 IBM Corporation 7 iCloud iCloud Sync iTunes Sync End User VPN / WiFi Corporate Network Access Personal Mail / Calendar Personal Apps Corporate Profile Enterprise Mail / Calendar Enterprise Access (VPN/WiFi) Enterprise Apps (App store or Custom) Secured by BigFix policy Encryption Enabled Endpoint Manager for Mobile Devices Enable password policies Enable device encryption Force encrypted backup Disable iCloud sync Access to corporate , apps, VPN, WiFi contingent on policy compliance! Selectively wipe corporate data if employee leaves company Fully wipe if lost or stolen Managing Mobile Devices – The Solution
© 2012 IBM Corporation 8 PCs and mobile devices have many of the same management needs Device inventory Security policy mgmt Application mgmt Device config (VPN/ /Wifi) Encryption mgmt Roaming device support Integration with internal systems Scalable/Secure solution Easy-to-deploy Multiple OS support Consolidated infrastructure Device Wipe Location info Jailbreak/Root detection Enterprise App store Self-service portal OS provisioning Patching Power Mgmt Traditional Endpoint ManagementMobile Device Management
© 2012 IBM Corporation 9 IBM Endpoint Manager delivers a unified systems and security management solution for all enterprise devices Windows & Mac Desktops/Laptops Unix / Linux Servers Windows Mobile / Kiosks / POS devices Android / iOS / Symbian / Windows Phone devices Supporting more devices… …and more capabilities. Mobile Device Mgmt Security Config Mgmt S/W Use Analysis OS DeploymentRemote Control Endpoint Protection Power Mgmt Patch Mgmt Device Inventory Configuration Mgmt
© 2012 IBM Corporation 10 Benefits of an Endpoint Manager based Approach to Mobile Device Management Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types – Gartner, PCCLM Magic Quadrant, January 2011 Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. – Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs Single pane for mobile devices, laptops, desktops, and servers Single Endpoint Manager Server scales to 250,000+ devices Unified infrastructure/administration model reduces FTE requirements Fast Time-to-Value Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required
© 2012 IBM Corporation 11 Agent-based Management Android via native BigFix agent iOS via Apples MDM APIs -based management through Exchange and Lotus Traveler Supported platforms: iOS, Android, Windows Phone, Windows Mobile, Symbian How does Endpoint Manager manage mobile devices? CategoryEndpoint Manager Capabilities Platform SupportApple iOS, Google Android, Nokia Symbian, Windows Phone, Windows Mobile Management ActionsSelective wipe, full wipe, deny access, remote lock, user notification, clear passcode End-User ServicesSelf-service portal, enterprise app store, authenticated enrollment (AD/LDAP) Application ManagementApplication inventory, enterprise app store, whitelisting, blacklisting, Apple VPP Policy & Security ManagementPassword policies, device encryption, jailbreak & root detection Location ServicesTrack devices and locate on map Enterprise Access ManagementConfigure , VPN, and Wi-Fi; certificate management Expense ManagementEnable/disable voice and data roaming
© 2012 IBM Corporation 12 Mobile Foundation Potential Integration Scenario Deny App Access Scenario Device is out of compliance with policy Deny enterprise app access Endpoint Manager (devices) Endpoint Manager (devices) On-going assessment of device compliance Deny app access Report compliance violation 4 4 Periodic query for device compliance status Policy violation detected 2 2 Worklight (apps) Worklight (apps) 1 1
© 2012 IBM Corporation 13 A Single Device View enables administrators and helpdesk personnel to easily view device details and take required action
© 2012 IBM Corporation 14 A flexible enrollment process enables organizations to include a EULA and to collect critical device and employee data via customizable questions
© 2012 IBM Corporation 15 Distribute apps using the Enterprise App Store
© 2012 IBM Corporation 16 A user-friendly iOS Profile Configuration Wizard exposes the configuration capabilities of Apples MDM APIs
© 2012 IBM Corporation 17 A Self-Service Portal empowers employees to locate lost devices and perform tasks such as lock, clear passcode, and device wipe
© 2012 IBM Corporation 18 iOS Jailbreak Notification
© 2012 IBM Corporation 19 View installed apps on Android and iOS devices
© 2012 IBM Corporation 20 IBM Endpoint Manager for Mobile Devices Architecture TEM Server DB Console / Web Reports Relay(s) Android Apple Apple Push Notification Servers w/ ActiveSync Phones / Tablets Desktops / Laptops Full Agents http / ActiveSync / IBM Sync https Apple MDM Interaction Apple Push Notification Servers Full Agents Management Extender for (Exchange or Lotus) http / Mgmt Extender for iOS Apple App Android App Server (Exchange/Lotus) Server (Exchange/Lotus)
© 2012 IBM Corporation 21 Summary of security controls to be enforced on mobile devices when Tivoli Endpoint Manager for MDM is installed
© 2012 IBM Corporation 22
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
© 2012 VMware Inc. All rights reserved Confidential VMware Sales Byte Virtualization Expansion for Simplified Desktop Management.
Mobile Security, Everything you NEED to know about Endpoint Security but were afraid to ask ! Matthew Johnson – Senior Technical Staff Member Mobility.
Empowering People-centric IT Speaker name 00/00/0000.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Wednesday, January 12th, 2011 Automating Inventory, Deployment and Configuration of Your Windows Infrastructure Dan Stolts, Microsoft Like most IT professionals,
Joey Snow Technical Evangelist Microsoft Corporation Session Code: WSV207.
Novell GroupWise ® Mobile Server, powered by Intellisync Gregory Webb Novell, GroupWise Product Marketing Ken Muir Director, Novell GroupWise Engineering.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
1 Blackboard Sales Presentation. 2 Agenda Introduction –The Company and the Community Why Blackboard –Product Strategy What Blackboard Provides –Product.
Information Security Level 2 – Sensitive © 2012 – Proprietary and Confidential Information of Amdocs Multi Chanel Self Service Amdocs and HTML5 Daniel.
1 Unified Communications and Collaboration Campaign MM TI-BDM Deck User Guidance Purpose of this deck: –Show how Microsoft ® Unified Communications and.
| Toll-free: How to have both Productivity and Security for Remote Access Solution in a HIPAA Environment Tom.
0 Agenda Market Trends and Business Considerations Fujitsu Customer Experiences Today Options Today and Beyond Q&A.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
Kunal Kodkani Senior Consultant Microsoft Corporation.
OpenScape Business A unified business solution for small and mid-size companies Oct
Confidential do not distribute. Page 1 This is Mozy Simple, Automatic, and Secure.
© 2005 Avaya Inc. All rights reserved. Avaya Global Services: Delivering IP Telephony Easily and Securely Peter Licata, VP, Managed Services George Sullivan,
Trends in Endpoint Security by Richard Lau Trends in Endpoint Security by Richard Lau 29 September 2005.
© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
® IBM Software Group © 2004 IBM Corporation WebSphere Commerce – Express V5.6 Fast, affordable e-commerce solutions for mid-sized companies Overview for.
SMS 2003 R2 and System Center Configuration Manager 2007 Technical Drilldown Martin Dey Director, Product Marketing Windows and Enterprise Management Division.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
© 2016 SlidePlayer.com Inc. All rights reserved.