Steven Scheurmann- Sales Leader, Asia Pacific & Japan, Endpoint & Mobility 스마트보안 Mobility, Smart Devices, BYOD Do You Have a Solution & Strategy?
Mobile is an enterprise priority Growth in Internet Connected Devices Mobile and Cloud are top spending priorities for CIOs 1 1200 WW Media Tablets WW Notebooks WW PCs WW Smartphones Unit Volumes (Millions) 600 0 2010 2011 2012E 2013E 2014E 2015E Source: Wells Fargo Securities, January 23, 2012 Fostering the People: The Shift to Engagement Apps Dramatic Growth in Mobile Devices Mobile data traffic exceeded voice in 2010 2 Shipments of Smartphones exceeded total PC shipments for the first time in 2011 3 10 Billion mobile connected devices are expected to be in use by 2020 3 1 2011 IBM Global CIO Study 2 Wireless Industry News, August 26, 2010 3 2011 Economist 2
The mobile lifecycle Strong demand by LoB Higher expectations of user experience with mobile apps Lack of best practices guidance on how to deliver mobile applications More direct involvement from users/stakeholders in design Native programming models are not portable across devices. Highly fragmented set of mobile devices and platforms Very large number of configurations of devices, platforms, carriers, etc. to test Mobile landscape evolves at a much faster pace More frequent releases and updates for apps with more urgent time-to-market demands 3
Mobile presents an enormous set of opportunities Business to Enterprise Business to Consumer Increase worker productivity Improved claims processing Increase revenue through sales engagements Extend existing applications to mobile workers and customers Reducing fuel, gas, or fleet maintenance costs that are relevant in particular industries Increase employee responsiveness and decision making speed Resolve internal IT issues faster Reduce personnel cost (utilizing personal owned instead of corporate issued devices) Improve customer satisfaction Deeper customer engagement and loyalty Drive increased sales through Personalized offers Customer service Competitive differentiator Improve brand perception Deeper insight into customer buying behavior for up sell and cross sell Improve in store experience with mobile concierge services 4
Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices have multiple personas Mobile devices are diverse. Mobile devices are used in more locations Mobile devices prioritize the user Personal phones and tablets shared with family Enterprise tablet shared with co-workers Social norms of mobile apps vs. file systems Work tool Entertainment device Personal organization Security profile per persona? OS immaturity for enterprise mgmt BYOD dictates multiple OSs Vendor / carrier control dictates multiple OS versions A single location could offer public, private, and cell connections Anywhere, anytime Increasing reliance on enterprise WiFi Conflicts with user experience not tolerated OS architecture puts the user in control Difficult to enforce policy, app lists 5
BYOD Questions to Ask Do you have the right policies in place? How are you going to manage and secure personal devices? Are employees aware of policies, security risks, enterprise capabilities? Do you have an enterprise app store? What services will you support beyond e- mail / calendar? Is your service desk ready? How will this impact your wireless networks? Client Functional Domain Back-end Server Services Social Interaction ERP and CRM ecommerce Marketing Merchandising Supply Chain Back Office 6
A Holistic Approach To Managing & Securing the Mobile Environment 1 Develop and Communicate Formal Mobile Strategy, Policies PUBLIC WIFI 3 Protect devices from malware, data theft MOBILE APPS WEB SITES 5 Test, deliver and manage securityrich apps 2 Efficiently acquire, deploy, secure, manage, and deprovision devices TELECOM PROVIDER 8 INTERNET 4 Actively manage corporate device purchases, service contracts, usage Manage users and access to enterprise apps and data SECURITY GATEWAY Deliver an Adaptive Security Posture 6 7 PRIVATE WIFI Manage and optimize enterprise wireless networks 7
IBM: Addressing Strategic Client Initiatives Extend & Transform Extend existing business capabilities to mobile devices Transform the business by creating new opportunities Build & Connect Build mobile apps Connect to, and run backend systems in support of mobile Manage & Secure Manage mobile devices and apps Secure my mobile business 8
Customers are focused on a new set of mobile client initiatives Client Initiatives Build mobile applications Connect to, and run backend systems in support of mobile Manage mobile devices and applications Secure my mobile business Extend existing business capabilities to mobile devices Transform the business by creating new opportunities *ING Canada Key Capabilities Mobile web app development Enterprise data, service, and application integration Mobile Technology Preview features Concord Hospital improved patch compliance 50%, reduced software license costs 25%, and has not had a single malware infection since implementation of IBM Endpoint Manager for patch management and core protection Key Capabilities Mobile Lifecycle Management Device analytics and control Secure Network Communications & Management Key Capabilities Strategy and planning services Mobile-enabled solutions including analytics, commerce, and social business Implementation and hosting services 9
And are looking for a mobile platform that solves their needs Banking Insurance Healthcare Telecom Retail Government Others IBM Enterprise Mobile Platform Business Results Extending business to mobile customers and workforce Improve operational efficiencies and reduce costs Differentiate the customer experience Enable new services and business models Workforce Optimization Product and Service Innovation Customer Care and Insights 3 rd Party Mobility Services Social Collaboration User Notification Location Services Mobile Payments Social Mobile Commerce Build mobile applications Connect to, and run backend systems in support of mobile Manage mobile devices and applications Secure my mobile business Extend existing business capabilities to mobile devices Transform the business by creating new opportunities 10
Thinking About Mobile Differently Platforms Apps Vodafone Networks Devices OS s Business strategy and planning Process & transaction integrity Smarter Commerce Social Business BI & Analytics Etc. Full lifecycle solutions Open cross-platform development End-to-end security and management Integration with backend systems, enterprise data and cloud Open Governed Integral IBM Mobile Enterprise 11
IBM Office of the CIO Extending Corporate Access IBM's BYOD program really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business. Jeanette Horan, IBM CIO Customer Needs Support BYOD for a variety of mobile platforms securely for a highly mobile population Scale to hundreds of thousands of devices Key Features & Outcomes 120,000 mobile devices, 80,000 personally owned, supported in months Integrated Lotus Traveler, IBM Connections, IBM Sametime, and IBM Endpoint Manager 12
Device Management, Security IBM Endpoint Manager for Mobile Devices: A highly-scalable, unified solution that delivers device management and security across device types and operating systems for superior visibility and control Managed = Secure Client Challenge Systems management Desktop / laptop / server endpoint Common agent Unified console Common infrastructure Single server IBM Endpoint Manager Mobile endpoint Security management Purpose-specific endpoint Key Capabilities A unified systems and security management solution for all enterprise devices Near-instant deployment of new features and reports to customer s environments Platform to extend integrations with Service Desk, CMDB, SIEM, and other informationgathering systems to mobile devices Advanced mobile device management capabilities for ios, Android, Symbian, and Windows Mobile, Windows Phone Security threat detection and automated remediation 13
IBM Endpoint Manager for Mobile Devices Enable password policies Enable device encryption Force encrypted backup Disable icloud sync Personal Mail / Calendar Personal Apps Access to corporate email, apps, VPN, WiFi contingent on policy compliance! Selectively wipe corporate data if employee leaves company Corporate Profile Enterprise Mail / Calendar Enterprise Access (VPN/WiFi) Enterprise Apps (App store or Custom) Encryption Enabled VPN / WiFi Corporate Network Access Fully wipe if lost or stolen icloud icloud Sync itunes Sync 14
Benefits of a Unified Approach Organizations would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types Gartner, PCCLM Magic Quadrant, January 2011 Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs Single pane for mobile devices, laptops, desktops, and servers Single Endpoint Manager Server scales to 250,000+ devices Unified infrastructure / administration model reduces FTE requirements Fast Time-to-Value Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required 15
Approaches to Mobile Device Management Advanced management on ios through Apple s MDM APIs Advanced management on Android through a BigFix agent Email-based management through Exchange (ActiveSync) and Lotus Traveler (IBMSync) ios Android Windows Phone Windows Mobile Symbian 16
Create and Manage Profiles 17
Single Device Views for User Support 18 18
App Management Recommend, Whitelist, Blacklist, Remove 19
Jailbreak / Root Detection Warn Users, Notify Administrators, Take Action 20
Endpoint Manager in Action: Utility Provider Adding Mobile Devices Without Adding Infrastructure Serving 4.5 million customers in the southwestern region of the United States, this electric company of 25,000 employees is a leader in clean energy while exceeding reliability standards and keeping consumer costs below average. They are experiencing a migration from traditional endpoints to mobile devices. Customer Needs Support 20,000+ mobile devices Corporate and employee-owned, many platforms and OS versions High availability for certain devices used in the field Adherence to Internal security policies, external regulations Key Features & Outcomes Scalability to 250,000 endpoints provides room to grow Added mobile devices to existing IEM deployment in days Ability to integrate with Maximo, Remedy Responsiveness and agility of product and product team 21
Identity & Access Manager Worklight Mobile app development Netcool / OMNIbus network management Lotus Traveler mobile e-mail, calendar Endpoint Manager mobile device mgmt Q Radar Security intelligence Federated identity mgmt The Complete Ecosystem 22 signal quality perf data deploy, update Remediation actions policy Remediation actions compliance status Security events hw, sw inventory Remediation actions open ticket TAMIT, CCMDB, Maximo asset mgmt Control Desk service desk
Thank You www.ibm.com/mobile-enterprise 2012 IBM Corporation 23