+ All Categories
Home > Software > Beyond BYOD

Beyond BYOD

Date post: 14-Aug-2015
Category:
Upload: agilly-mobility
View: 15 times
Download: 0 times
Share this document with a friend
Popular Tags:
25
© 2015 IBM Corporation Jim Lundy – Aragon Chris Poulin – IBM July 23, 2015 Beyond BYOD: Securing IoT in the Enterprise for Employee Productivity
Transcript
Page 1: Beyond BYOD

© 2015 IBM Corporation

Jim Lundy – Aragon Chris Poulin – IBM July 23, 2015

Beyond BYOD: Securing IoT in the Enterprise for Employee Productivity

Page 2: Beyond BYOD

2 © 2015 IBM Corporation

Introductions

Jim Lundy CEO and Lead Analyst

Aragon Research

Chris Poulin Research Strategist

IBM

Page 3: Beyond BYOD

3 © 2015 IBM Corporation

Housekeeping items

Duration – 60 minutes Submit your questions to all

panelists in the Q&A box located in the bottom right corner of your screen

Recording and slides will be emailed to you

Page 4: Beyond BYOD

The Future of Work is Digital

Page 5: Beyond BYOD

Agenda

• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the

enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the

onslaught of new devices in the enterprise?

© 2015 Aragon Research Inc. All Rights Reserved. 5

Page 6: Beyond BYOD

Computing is Shifting….to Mobile

Speech UI Predictive Apps Cognitive Apps

Mainframe PC Tablet Wearable/IOT

1964-1981 1981-2011 2011- 2015-

© 2015 Aragon Research Inc. All Rights Reserved. 6

Batch Processing

Desktop Apps Client/Server

Mobile Apps Digital Paper APIs

Paper Copying Faxing Email

Social Mobile Apps Cloud

Work Tools Digital Assistants Predictive Apps Drones/Robots

Page 7: Beyond BYOD

The Major Trends Driving Innovation in Business

Strategic Assumptions Computers and Humans will work closer together than ever before.

Technology becomes a Competitive Weapon in Business.

Page 8: Beyond BYOD

IOT is about Connecting Everything

1.3 Billion Devices 2.5 Million Apps

2014

2020 4 Billion Phones

30 Million Apps

700 Million Devices

400 Million Tablets

Page 9: Beyond BYOD

The Impact of IOT on Work

9

Find Content via Voice Continue in Car

Worker Activity - iBeacon

On the Go

Page 10: Beyond BYOD

Innovation and Market Disruption in a Digital Era

Taxi Uber Taxi App

App Economy

1894- 2012-

Electric Cars

Gas Powered Car Electric Car

2009- 1897-

Page 11: Beyond BYOD

Agenda

• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the

enterprise and how will BYOD initiatives change?

• What are the best practices to prepare for the onslaught of new devices in the enterprise?

© 2015 Aragon Research Inc. All Rights Reserved. 11

Page 12: Beyond BYOD

Aragon Research Technology Arc for Mobile, 2015 – Collaboration is the driving force

Emerging Technologies being Adopted as Fast as Mature ones.

Page 13: Beyond BYOD

The Shift from Mobile to IOT

EMM Expands to Wearables and IOT

Enterprise Mobile Management

PC / Server Management

More Devices and More Apps

Page 14: Beyond BYOD

Wearables: Making Work and Life Simpler?

Hotel Check-in Airlines Dining Exercise

Content Email

Home Control

CRM

Page 15: Beyond BYOD

IOT will cause an App Explosion

30 Million

4 Million

2015 2020

Homes

Cars

Buildings

Devices

Apps Everywhere Business Disruption Executives Need to Understand Mobile Enterprises need to war game scenarios

App Growth

Page 16: Beyond BYOD

Security is Mission Critical

16 Enterprises need to invest more in Security Software.

Executives Are

Targets

Your IP is at Stake Your Executives are being targeted.

Page 17: Beyond BYOD

Agenda

• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the

enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the

onslaught of new devices in the enterprise?

© 2015 Aragon Research Inc. All Rights Reserved. 17

Page 18: Beyond BYOD

Enterprise Mobile Management is Strategic

Enterprise Mobile

Management

Mobile Device

Management

Mobile App Management

Mobile Content

Management

© 2014 Aragon Research Inc.

Page 19: Beyond BYOD

Elements of an EMM Strategy

19

Policy for New Devices

Update Approach for IOT

Security for Apps

Page 20: Beyond BYOD

Update your Mobile App Strategy

20

Apps that will benefit from Wearable Interface

Access a Service Easy to access a

Cloud app

Content Distribution News Training Content Books Movies, Music Games

Market the Business Location finder Brand awareness

Redefine the user or the Customer Experience - Leverage

Wearables - IOT As Business

Strategy

Page 21: Beyond BYOD

Where to Start

1. Mobile Devices for Mobile Work

2. Prepare for Wearables

3. Understand IOT 4. Apps as a Business

Strategy

Mobile

Mobile App Jam

Page 22: Beyond BYOD

Mobile and the Future of Software

Mobile First Apps are here

Page 23: Beyond BYOD

IoT Era has arrived Develop a Strategy to Manage

Devices besides Phones EMM is a critical Success Factor Don’t wait to Deploy

Enterprises should adjust current

policies relative to New Devices and Apps

Summary

Page 24: Beyond BYOD

24 © 2015 IBM Corporation

Page 25: Beyond BYOD

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU www.ibm.com/security


Recommended