We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRachel Hudspeth
Modified over 2 years ago
© 2012 IBM Corporation IBM Endpoint Manager for Mobile Devices Mobile Device Management
© 2012 IBM Corporation 2 Android and iOS devices have quickly penetrated the enterprise, bringing productivity gains, along with increased risk and cost IBM Endpoint Manager for Mobile Devices delivers strong MDM capabilities in an infrastructure that enables unified management of all enterprise devices – desktops, laptops, servers, smartphones, and tablets IBM is uniquely positioned to deliver end-to-end app and mobile device lifecycle management with Mobile Application Development Platform (MADP), Mobile Device Management (MDM), and Telecom Expense Management capabilities Executive Summary
© 2012 IBM Corporation 3 Android and iOS accounted for 79% of all smartphone shipments Source: Gartner 2012; does not include media tablets Share of global Q smartphone sales to end users, by OS
© 2012 IBM Corporation 4 Mobile devices magnify existing challenges and also pose unique ones that significantly disrupt traditional management paradigms Traditional Mgmt ModelNew Device Mgmt Paradigm Enterprises provide all equipmentEmployees bring personal devices (BYOD) Small set of supported platforms / modelsMany different manufacturers / models IT initiates and manages upgradesOS/app upgrades managed by carriers, OEMs, users IT tightly controls apps and securityUsers control their own devices Options for IT departments Dont allow mobile devices because they are too hard to manage Allow unmanaged and insecure mobile devices Invest in tools to secure and manage devices
© 2012 IBM Corporation 5 IBM is uniquely positioned to deliver end-to-end app and mobile device lifecycle management Key Capabilities Strategy, planning and implementation Mobile-enabled solutions including analytics, commerce, and social business Mobile as a service Key Capabilities Mobile web, hybrid and native app development Enterprise data, service, and application integration Enterprise wireless networking Key Capabilities Mobile lifecycle management Device analytics and control Secure network communications & management Build & Connect Manage & Secure Extend & Transform
© 2012 IBM Corporation 6 Security & Management Challenges Potential unauthorized access (lost, stolen) Disabled encryption Insecure devices connecting to network Corporate data leakage Mail / Calendar / Contacts Access (VPN / WiFi) Apps (app store) Enterprise Apps iCloud iCloud Sync iTunes Sync Encryption not enforced End User VPN / WiFi Corporate Network Access Managing Mobile Devices – The Problem
© 2012 IBM Corporation 7 iCloud iCloud Sync iTunes Sync End User VPN / WiFi Corporate Network Access Personal Mail / Calendar Personal Apps Corporate Profile Enterprise Mail / Calendar Enterprise Access (VPN/WiFi) Enterprise Apps (App store or Custom) Secured by BigFix policy Encryption Enabled Endpoint Manager for Mobile Devices Enable password policies Enable device encryption Force encrypted backup Disable iCloud sync Access to corporate , apps, VPN, WiFi contingent on policy compliance! Selectively wipe corporate data if employee leaves company Fully wipe if lost or stolen Managing Mobile Devices – The Solution
© 2012 IBM Corporation 8 PCs and mobile devices have many of the same management needs Device inventory Security policy mgmt Application mgmt Device config (VPN/ /Wifi) Encryption mgmt Roaming device support Integration with internal systems Scalable/Secure solution Easy-to-deploy Multiple OS support Consolidated infrastructure Device Wipe Location info Jailbreak/Root detection Enterprise App store Self-service portal OS provisioning Patching Power Mgmt Traditional Endpoint ManagementMobile Device Management
© 2012 IBM Corporation 9 IBM Endpoint Manager delivers a unified systems and security management solution for all enterprise devices Windows & Mac Desktops/Laptops Unix / Linux Servers Windows Mobile / Kiosks / POS devices Android / iOS / Symbian / Windows Phone devices Supporting more devices… …and more capabilities. Mobile Device Mgmt Security Config Mgmt S/W Use Analysis OS DeploymentRemote Control Endpoint Protection Power Mgmt Patch Mgmt Device Inventory Configuration Mgmt
© 2012 IBM Corporation 10 Benefits of an Endpoint Manager based Approach to Mobile Device Management Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types – Gartner, PCCLM Magic Quadrant, January 2011 Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. – Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs Single pane for mobile devices, laptops, desktops, and servers Single Endpoint Manager Server scales to 250,000+ devices Unified infrastructure/administration model reduces FTE requirements Fast Time-to-Value Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required
© 2012 IBM Corporation 11 Agent-based Management Android via native BigFix agent iOS via Apples MDM APIs -based management through Exchange and Lotus Traveler Supported platforms: iOS, Android, Windows Phone, Windows Mobile, Symbian How does Endpoint Manager manage mobile devices? CategoryEndpoint Manager Capabilities Platform SupportApple iOS, Google Android, Nokia Symbian, Windows Phone, Windows Mobile Management ActionsSelective wipe, full wipe, deny access, remote lock, user notification, clear passcode End-User ServicesSelf-service portal, enterprise app store, authenticated enrollment (AD/LDAP) Application ManagementApplication inventory, enterprise app store, whitelisting, blacklisting, Apple VPP Policy & Security ManagementPassword policies, device encryption, jailbreak & root detection Location ServicesTrack devices and locate on map Enterprise Access ManagementConfigure , VPN, and Wi-Fi; certificate management Expense ManagementEnable/disable voice and data roaming
© 2012 IBM Corporation 12 Mobile Foundation Potential Integration Scenario Deny App Access Scenario Device is out of compliance with policy Deny enterprise app access Endpoint Manager (devices) Endpoint Manager (devices) On-going assessment of device compliance Deny app access Report compliance violation 4 4 Periodic query for device compliance status Policy violation detected 2 2 Worklight (apps) Worklight (apps) 1 1
© 2012 IBM Corporation 13 A Single Device View enables administrators and helpdesk personnel to easily view device details and take required action
© 2012 IBM Corporation 14 A flexible enrollment process enables organizations to include a EULA and to collect critical device and employee data via customizable questions
© 2012 IBM Corporation 15 Distribute apps using the Enterprise App Store
© 2012 IBM Corporation 16 A user-friendly iOS Profile Configuration Wizard exposes the configuration capabilities of Apples MDM APIs
© 2012 IBM Corporation 17 A Self-Service Portal empowers employees to locate lost devices and perform tasks such as lock, clear passcode, and device wipe
© 2012 IBM Corporation 18 iOS Jailbreak Notification
© 2012 IBM Corporation 19 View installed apps on Android and iOS devices
© 2012 IBM Corporation 20 IBM Endpoint Manager for Mobile Devices Architecture TEM Server DB Console / Web Reports Relay(s) Android Apple Apple Push Notification Servers w/ ActiveSync Phones / Tablets Desktops / Laptops Full Agents http / ActiveSync / IBM Sync https Apple MDM Interaction Apple Push Notification Servers Full Agents Management Extender for (Exchange or Lotus) http / Mgmt Extender for iOS Apple App Android App Server (Exchange/Lotus) Server (Exchange/Lotus)
© 2012 IBM Corporation 21 Summary of security controls to be enforced on mobile devices when Tivoli Endpoint Manager for MDM is installed
© 2012 IBM Corporation 22
Empowering People-centric IT User and Device Management Access and Information Protection Microsoft Virtual Desktop Infrastructure.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Unified Endpoint Management and Security Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
PC Security Data protection through device lockdown (Group Policy, app mgmt., OSD, compliance) Hardening devices against attack (patch, anti-malware,
Gary Gruba Systems Engineer Absolute Manage MDM Managing iPhones, iPads, iPod Touches and Android Dougald MacNaughton Account Executive.
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Designing Enterprise Mobility Cortado Corporate Server.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Symantec App Center 1 Silvester Drobnič
Meraki Mobile Device Management. Meraki System Manager Capabilities 1. Centrally Manage Mobile Devices, Macs, and PCs Unify management and control of.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Mobile Data Management (MDM) July 24, 2013 Lance M. Calisch.
Short Customer Presentation September The Company Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Mobile Protection Overview Pedro Pinto Sophos Confidential.
Craig Pringle & Derek Moir Bring IT All Together with Enterprise Mobility Suite: A day in the life with EMS MOB223.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Mobile Device Management: Do You Know Whos Accessing Your Network? Umesh Shah, Dir. Channel Marketing.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
McAfee One Time Password Easy. Flexible. Complete. 1 Product Marketing NSBU.
© 2013 International Business Machines Corporation 1 Running a successful BYOD Initiative Albee Jhoney Hari H Krishna.
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Chris Nilsson n.
Introducing 1 KASPERSKY ENDPOINT SECURITY FOR BUSINESS.
Total Enterprise Mobility Comprehensive Management and Security
Empowering People-centric IT Speaker name 00/00/0000.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Enterprise Mobility Platform Microsoft Differentiation Managed Mobile Productivity Layered Protection Hybrid Solutions Office 365DynamicsWorkday.
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
© 2017 SlidePlayer.com Inc. All rights reserved.