We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLuca Layng
Modified over 2 years ago
© 2013 International Business Machines Corporation 1 Running a successful BYOD Initiative Albee Jhoney Hari H Krishna
© 2013 International Business Machines Corporation 2 Life was so much easier when everyone simply had a Blackberry Android and iOS accounted for 79% of all smartphone shipments Many employees want to use their devices to access work information Mobile devices offer significant advantages for companies ‘Halo effect’ of Apple Mac’s Before companies can realise the benefits of mobile devices, they need to be able to manage the associated risks Share of global Q1 2012 smartphone sales to end users, by OS Source: Gartner 2012; does not include media tablets
© 2013 International Business Machines Corporation 3 IT manages risks by maintaining control points
© 2013 International Business Machines Corporation 4 With BYOD, IT loses control
© 2013 International Business Machines Corporation 5 PCs and mobile devices have many of the same management needs Device inventory Security policy mgmt Application mgmt Device config (VPN/Email/Wifi) Encryption mgmt Roaming device support Integration with internal systems Scalable/Secure solution Easy-to-deploy Multiple OS support Consolidated infrastructure Device Wipe Location info Jailbreak/Root detection Enterprise App store Self-service portal OS provisioning Patching Power Mgmt Traditional Endpoint ManagementMobile Device Management “Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types” – Gartner, PCCLM Magic Quadrant, January 2011
© 2013 International Business Machines Corporation 6 Potential unauthorized access (lost, stolen) Disabled encryption Insecure devices connecting to network Corporate data leakage 6 Mail / Calendar / Contacts Access (VPN / WiFi) Apps (app store) Enterprise Apps iCloud iCloud Sync iTunes Sync Encryption not enforced End User VPN / WiFi Corporate Network Access Managing Mobile Devices – The Problem
© 2013 International Business Machines Corporation 7 iCloud iCloud Sync iTunes Sync End User VPN / WiFi Corporate Network Access Personal Mail / Calendar Personal Apps Corporate Profile Enterprise Mail / Calendar Enterprise Access (VPN/WiFi) Enterprise Apps (App store or Custom) Secured by BigFix policy Encryption Enabled Enforce password policies Enable device encryption Force encrypted backup Disable iCloud sync Access to corporate email, apps, VPN, WiFi contingent on policy compliance! Selectively wipe corporate data if employee leaves company Fully wipe if lost or stolen Managing Mobile Devices – The Solution
© 2013 International Business Machines Corporation 8 430,000 IBM employees in over 120 countries. Deployment to over 750,000 endpoints A 78 per cent decrease in endpoint security issues IBM is also in the process of deploying Mobile Device Management solution across its entire mobile workforce of over 120,000 staff BYOD with 200,000+ smartphones projected 2099+ Terabytes of WAN traffic per month IBM understands the demands of managing a global heterogeneous IT infrastructure with BYOD
© 2013 International Business Machines Corporation 9 Providing enterprise-wide visibility (eg. device details, apps installed, device location) Ensuring data security and compliance Device configuration Support devices on the Apple iOS, Google Android, Microsoft Windows Phone, Blackberry, Nokia Symbian Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments Manage enterprise and personal data separately with capabilities such as selective wipe Leverage a single infrastructure to manage all enterprise devices—smartphones, tablets, desktops, laptops and servers Benefits:Services: Apple iOS Google Android “IBM's MDM capability is very complementary to that of PCs, and it is one of the few vendors in this Magic Quadrant that can support PCs and mobile devices” Gartner, MQ for Mobile Device Management Software, 2012 Mobile Device Management Windows Phone Blackberry Nokia Symbian Windows Mobile
© 2013 International Business Machines Corporation 10 Implement BYOD With Confidence App container. Deploy, manage, configure, and remove Enterproid Divide containers to separate personal and work environments on iOS and Android devices PIM container. Separate personal and corporate email and prevent sensitive data from being copied into other apps with NitroDesk TouchDown integration Dual-persona OS. Manage BlackBerry 10 devices, which provide a native user experience to personal and work personas Extend BYOD to laptops. Unified device management approach brings together containers, smartphones, tablets, laptops, desktops, and servers under one infrastructure How do I deal with the business mandate that employees be allowed to "Bring Your Own Device"? Manage and secure only the apps and data inside the enterprise container, leaving users free to control the personal side of their device with Enterproid Divide.
© 2013 International Business Machines Corporation 11 Handle Multi-Platform Complexities With Ease Device management via Android agent, iOS APIs, Lotus Traveler, Microsoft Exchange, and Office 365 Complete device hardware and software inventory in near real-time Web reports provide at-a-glance mobile device deployment overviews Pass mobile device data to network management, service desk, asset management, and security and compliance systems Multi-tenancy support for service providers and organizations that need to completely separate different parts of the organization How do I manage an ever-expanding list of OS and hardware platforms when the user controls what apps are loaded and the carrier controls when the OS is updated? Better plan internal mobile projects with easy access to near-real time data about your mobile environment.
© 2013 International Business Machines Corporation 12 Secure Sensitive Data, Regardless of the Device Unified compliance reporting across all devices, including CIS Benchmarks Configure security settings such as password policy, encryption, WiFi, iCloud sync Full wipe, remote lock, map device location, and clear passcode options if device is lost or stolen Blacklist apps and automate alerts, policy response Detect jailbroken / rooted devices to notify users, disable access Integrate with mobile VPN and access management tools to ensure only compliant devices are authorized How do I ensure the security of mobile devices as they access more and more sensitive systems? Multiple user communication and alert methods, including Google Cloud Messaging (GCM), enables users to be part of the security solution.
© 2013 International Business Machines Corporation 13 Minimize Administration Costs Multiple authenticated device enrollment options, including LDAP/AD integration Employee self-service portal to enable employees to protect personal and enterprise data Enterprise app store directs employees to approved apps, includes support for Apple’s Volume Purchase Program (Apple VPP) Integration with IBM Worklight for 1- click transfer of internally-developed mobile apps from dev to production A ‘single device view’ enables IT personnel to easily view device details and take required action How do I cost-effectively manage the sheer volume of these tiny devices with average replacement rates of 12-18 months? A flexible enrollment process enables organizations to include a EULA and to collect critical device and employee data via customizable questions
© 2013 International Business Machines Corporation 14 IBM Endpoint Manager Endpoints Common management agent Unified management console Common infrastructure Single server IBM Endpoint Manager Patch Management Lifecycle Management Software Use Analysis Power Management Mobile Devices Security and Compliance Core Protection Desktop / laptop / server endpoint MobilePurpose specific Systems Management Security Management Server Automation Continuously monitors the health and security of all enterprise endpoint in real-time via a single, policy-driven agent
© 2013 International Business Machines Corporation 15 IBM Endpoint Manager for Mobile Devices Functionality Overview Category Platform Support Management Actions Application Management Policy and Security Management Location Services Enterprise Access Management Endpoint Manager Capabilities Selective/full wipe, deny email access, remote lock, user notification, clear passcode Application inventory, enterprise app store, iOS WebClips, whitelisting/blacklisting Configuration of Email, VPN, Wi-Fi, Authenticated Enrollment, Self Service Portal Track devices and locate on map Expense Management Enable/disable voice and data roaming Cloud Email Device Management Office 365 support Apple iOS, Google Android, Windows Phone, Blackberry, Symbian, Windows Mobile Password policies, Samsung SAFE, device encryption, jailbreak/root detection Containerisation Nitrodesk Touchdown (Android), Enterproid Divide, Red Bend
© 2013 International Business Machines Corporation 16 Single Server & Console Highly secure, highly scalable Aggregates data, analyzes & reports Pushes out pre-defined/custom policies Cloud-based Content Delivery Highly extensible Automatic, on-demand functionality Single Intelligent Agent Performs multiple functions Continuous self-assessment & policy enforcement Minimal system impact (< 2% CPU) Lightweight, Robust Infrastructure Use existing systems as Relays Built-in redundancy Support/secure roaming endpoints How it Works Remote Offices Manage roaming devices Identify unmanaged assets
© 2013 International Business Machines Corporation 17 Authenticated Enrollment and Self Service portal A flexible enrollment process can include an EULA and collect critical device and employee data via customisable questions
© 2013 International Business Machines Corporation 18 Authenticated Enrollment and Self Service portal
© 2013 International Business Machines Corporation 19 Complete device hardware and software inventory
© 2013 International Business Machines Corporation 20 Last known location of the device
© 2013 International Business Machines Corporation 21 Create your own Enterprise AppStore 21
© 2013 International Business Machines Corporation 22 Secure the device A unified report of password policies across all mobile OS’ makes it easy for administrators to identify non-compliant devices
© 2013 International Business Machines Corporation 23 Secure the device
© 2013 International Business Machines Corporation 24 Endpoint Manager for Mobile Devices, Part of IBM MobileFirst AnalyticsSecurityManagement IBM & Partner Applications Application Platform and Data Services BankingInsurance Transport TelecomGovernment Industry Solutions HealthcareRetail Automotive Application & Data Platform Strategy & Design Services Development & Integration Services Cloud & Managed Services Devices Network Servers
© 2013 International Business Machines Corporation 25 Stanford University uses IBM Endpoint to support it’s large BYOD environment of over 45,000 endpoints Stanford University Palo Alto, California Population: 30,000 45,000+ End Points The solution Opt-in Power Management Security Patching (Windows / Mac) Inventory Anti Malware Application Updates Software deployment Laptop Recovery PGP Whole Disk Encryption Benefits Rapid Operating System Patching and Compliance (across Windows and OS X) Accurate IT asset inventory Power Savings: Pacific Gas & Electric Rebate ~$70,000 May 2009 https://itservices.stanford.edu/service/bigfix
© 2013 International Business Machines Corporation 26 Consolidate management of endpoints – PCs, laptops, mobile devices HIPAA compliance Minimize on-going operational costs Minimize device replacement costs Customer Needs Key Features & Outcomes Large Healthcare Provider This regional healthcare provider uses IBM Endpoint Manager for its unified approach to endpoint management 1 employee is able to manage and secure 30,000 PCs + 4,000 mobile devices Extending the reach of healthcare This innovative healthcare provider in the southeastern United States is piloting a program to improve patient outcomes by providing secure healthcare support remotely through mobile devices, such as: Home Health Care: iPads provided to Home Healthcare diabetes patients to enable direct input of diagnostic data; Face time sessions with home health nurses reduce the need for on-site visits, which improves nurse utilization while reducing costs Education: iPod Touches with pre-loaded educational apps provided to parents of babies in Neonatal Intensive Care Unit (NICU)
© 2013 International Business Machines Corporation 27 Providing enterprise-wide visibility (eg. device details, apps installed, device location) Ensuring data security and compliance Device configuration Support devices on the Apple iOS, Google Android, Microsoft Windows Phone, Blackberry, Nokia Symbian Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments Manage enterprise and personal data separately with capabilities such as selective wipe Leverage a single infrastructure to manage all enterprise devices—smartphones, tablets, desktops, laptops and servers Benefits:Services: Apple iOS Google Android “IBM's MDM capability is very complementary to that of PCs, and it is one of the few vendors in this Magic Quadrant that can support PCs and mobile devices” Gartner, MQ for Mobile Device Management Software, 2012 Mobile Device Management Nokia Symbian Windows Phone Blackberry Windows Mobile
© 2013 International Business Machines Corporation 28 ibm.com
© 2013 International Business Machines Corporation 29 Legal Disclaimer © IBM Corporation 2012 All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.http://www.ibm.com/legal/copytrade.shtml If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.
© 2013 International Business Machines Corporation 30 Backup
© 2013 International Business Machines Corporation 31 Management by EmailFully-Managed Devices IEM Server DB ActiveSync Agent Comms / Management APIs Consolidated Reports / Management TEM Relay Mgmt Extender for iOS TEM Relay Mgmt Extender for iOS Lotus Traveler / Exchange Server ActiveSync Apple Push Notification Servers Google Cloud Messaging (optional) IBM Endpoint Manager for Mobile Devices Architecture
© 2013 International Business Machines Corporation 32 IBM Endpoint Manager for Mobile Devices Integration with Enterproid’s Divide container technologies for iOS and Android Web-based administration console for performing basic device management tasks with role-based access control Integration with BlackBerry Enterprise Server for integrated support of BlackBerry v4 – v7 devices Enhanced security with support for FIPS 140-2 encryption and bi-directional encryption of communications with Android agent Additional Samsung SAFE APIs for expanded management and security of SAFE devices SmartCloud Notes & Notes Traveler 9.0 support, including cloud and high- availability versions IBM Endpoint Manager’s cloud-based content delivery system enables customers to benefit from frequent feature enhancements without the difficulty of performing upgrades
© 2013 International Business Machines Corporation 33 Jailbreak / Root Detection – Warn Users, Notify Administrators, Take Action
© 2013 International Business Machines Corporation 34 IBM announced same-day support for Apple iOS6 New MDM features in iOS6 Ability to set a device-level proxy (only works in "Supervise mode") Single-app mode. Ability to set a "Locked App" like a "Kiosk Mode" Some new restrictions like the ability to disable Game Centre Configure a profile to automatically be removed at a specified date Disable recent contacts from syncing for a given email account Disable passbook while device is locked Disable shared photo streams
© 2013 International Business Machines Corporation 35 Fast and cost-effective development, integration and management of rich, cross-platform mobile applications Client Challenge Key Capabilities Using standards-based technologies and tools and delivering an enterprise-grade services layer that meets the needs of mobile employees and customers Mobile optimised middleware Open approach to 3rd-party integration Mix native and HTML Strong authentication framework Encrypted offline availability Enterprise back-end connectivity Unified push notifications Data collection for analytics Direct updates and remote disablement Packaged runtime skins Delivering for multiple mobile platforms IBM Worklight Encrypted cache on-device A mechanism for storing sensitive data on the client side Encrypted - like a security deposit box
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
© 2014 IBM Corporation The insights to transform the business with speed and conviction Kevin Redmond Head of Information Management Central & Eastern.
IBM Endpoint Manager for Mobile Devices Mobile Device Management
© 2009 IBM Corporation ® IBM Lotus Notes and Domino Product Roadmap April 2009.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
Please Note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
STORY TITLE Product futures are directional in nature and does not imply any product plan commitment on the part of IBM. Plans are subject to change at.
© 2012 IBM Corporation IBM Worklight Overview Martin Triska – IBM Worklight specialist (420) July 2012.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC &
© 2009 IBM Corporation IBM Information Protection Services – fastprotect online Providing managed, continuous backup and fast data recovery for desktops.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
IBM eServer iSeries © 2003 IBM Corporation ™™ iSeries Solutions for Business Continuity IBM eServerJ iSeriesJ © 2003 IBM Corporation.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
© 2011 IBM Corporation January 2011 Pam Denny, IBM V7 Reporting.
Tim Vander Kooi Systems
User and Device Management
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
I want stress-free IT. i want control. i want an i. IBM System i ™ Session: Secure Perspective Patrick Botz IBM Lab Services Security Architecture Consulting.
by Evolve IP Managed Services
IBM Mobile Enterprise Launch David Lee Heyman WW Mobile Business Agility Tiger Team.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Saasabi’s Analytical Processing Engine in the Cloud Makes Business Intelligence Affordable for Everyone COMPANY PROFILE: Saasabi Saasabi is a BizSpark.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
Mobilise Your Business in Days with Crimson Tide’s mpro5 Enterprise Solution on Microsoft Azure! MICROSOFT AZURE ISV PROFILE: CRIMSON TIDE Crimson Tide.
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
© 2010 IBM Corporation ® IBM Software Group Assistive Technology As applied to the workplace Niamh Foley.
V-Alliance Solution Overview Years of Business Success.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Built on the Powerful Microsoft Azure Platform, Nimble Schedule Streamlines and Automates Scheduling with Cloud-Based Mobile Services MICROSOFT AZURE ISV.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Protect your data Enable your users Unify Your Environment DevicesAppsData Help organizations enable their users to be productive on the devices they.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
© 2017 SlidePlayer.com Inc. All rights reserved.