Date post: | 15-Apr-2017 |
Category: |
Mobile |
Upload: | ibm-maas360 |
View: | 413 times |
Download: | 1 times |
Embracing Android Nougat for Speed, Strength and Security
October 6, 2016
MaaS360 Product Management
Frank Schloendorn, Imtiazuddin A. Bellary
2 IBM Security 2 © 2016 IBM Corporation
Housekeeping items
Duration – 60 minutes
Submit your questions to the Q&A box located on the
left-hand side of your screen
Recording and slides will be emailed to you
3 IBM Security 3 © 2016 IBM Corporation
Agenda
• Android Nougat at a Glance Key Features
Improved Performance
Enhanced Security
• Enterprise Features - Android for Work
• Leveraging Android Nougat with IBM MaaS360
4 IBM Security 4 © 2016 IBM Corporation
Android N – At a Glance
• Released on August 22nd 2016, Android N upgrade available for
Nexus 6P, 5X, 9
HTC 10, One A9, One M9
Samsung Galaxy S7, S7 Edge, S6, S6 Edge, Note 5, Note 7
LG G5, V20 (New)
Few models of Sony, Motorola and others
• New Features include
Multi Window support (2 Apps side-by-side and easy switching)
Better & Secure Android for Work
Smarter battery (Doze on the Go)
Bundled Notifications & Direct reply on notification
Data Saver & Notification controls
File base encryption (and seamless security updates)
JIT Complier, VR mode & Vulkan API (High performance graphics) for improved performance
• IBM MaaS360 released same-day support for Android Nougat devices
5 IBM Security 5 © 2016 IBM Corporation
Android N – Key Features – Productivity & Usability
• Multi Window View (Split Screen) Available in both portrait and landscape
Activated by long-pressing the app overview/recent apps
button or by long-pressing an app preview card
• Quick Switch between apps Shuffle between the two most recently used apps
• Customize Quick Settings Handy list of five toggles at the top of your notifications shade
Edit the order to prioritize the important ones
Multiple pages of tiles
• Notification Direct Reply Quick reply to a message directly from the notification
IBM CONFIDENTIAL
6 IBM Security 6 © 2016 IBM Corporation
Android N – Key Features – Productivity & Usability
• Bundled Notifications Multiple notifications from the same app to be bundled
• Notification Controls
Manage notification information to
• Show notifications silently
• Block all notifications
• Don’t silence or block
• Multi locale language support Set primary and secondary language
• 72 New Emojis
IBM CONFIDENTIAL
7 IBM Security 7 © 2016 IBM Corporation
Android N – Key Features - Performance
• Battery saver (Doze on the Go) Works not only when the device is stationary for a while
but also when it is in motion
Shuts down network access and only periodically sync
data and run tasks
• Data Saver mode Denies internet access to background apps when you're
connected to cellular data
Accessible both as a Quick Settings toggle or via the
Data area in Settings
IBM CONFIDENTIAL
8 IBM Security 8 © 2016 IBM Corporation
Android N – Key Features - Performance
• New JIT compiler Android system will pre-compile some apps but only
compile parts of other apps when they are actually
required
Faster booting phone, apps that use less RAM, require
less storage and get updated faster
• VR mode for high performance virtual reality
• Vulkan API (high performance 3D graphics) Faster, smoother and better rendered gaming graphics
IBM CONFIDENTIAL
9 IBM Security 9 © 2016 IBM Corporation
Android N – Key Features - Security
• Direct boot (faster, secure boot)
• Seamless Software updates Android updates will be downloaded in the background and
stored on a different system partition
On restart of the phone, the system will switch partitions and
you’ll instantly have the new Android updates
• File-based encryption Android 7.0 moves to a file encryption basis from full disk
encryption in Marshmallow
• Scoped folder access Allows app developers to specifically request access to
individual folders rather than all of your folders
• Trusted Face (Face recognizer)
IBM CONFIDENTIAL
11 IBM Security 11 © 2016 IBM Corporation
Android N – Android for Work
Customized & Faster Provisioning
QR Code Provisioning for DO mode
• Provision devices using QR code
• Ease of creation of QR code
• Wifi setup on the device via QR code
Customize color and enterprise logo
• Set up custom color and enterprise logo during profile
creation
Provision customers via Android for Work
Accounts Enterprise
• Let EMM vendors create and manage Google set up
and user accounts
• Effortless Administration via EMM portal
12 IBM Security 12 © 2016 IBM Corporation
Android N – Android for Work
Increased Security
Passcode challenge for work apps
• Mandate passcode challenge on navigation to work apps on a PO device
(BYOD)
• Enhanced security for corporate data
Always on VPN support
• Mandate Always on VPN for a device
Disable access to apps
• Blacklist apps on the device
Disable data roaming
• To save on network data usage
Lockdown wallpaper
Lockdown User Icon
Toggle Work Mode
• Control Work mode on PO devices
13 IBM Security 13 © 2016 IBM Corporation
Android N – Android for Work
Enhanced Productivity
Remote Reboot
• Reboot devices remotely
Process Logging
• Enable process logging to capture user actions on the
device
Remotely trigger bug reports
• Trigger bug reports to debug device irregularities
Device health monitoring
• Capture device health regularly
Multiple CA certificates per SSID
• Allow ease of Wifi and VPN configuration across
geographies
Personal and Work Contacts Integration
• Allow work contacts to be accessible in personal dialer
15 IBM Security 15 © 2016 IBM Corporation
IBM CONFIDENTIAL
Broadening productivity with Android for Work
With MaaS360, Android for Work and Samsung Knox, you can get Android devices more productive
& more secure for end users
Secure Content | Native User Experience • Easy management & enhanced security
• Prepackaged with work apps and collaboration tools
• Helps employees to work smarter and faster
Android for Work Settings in Android N • Greater Security with more certificate integrations, Always
ON VPN, Work Profile Security Challenges
• Enhanced remote support with remote reboot & bug
reports, disabling of data roaming, removing client
certificates
• Customized Provisioning, Lock screen messages & more
Expanding Support Matrix • Instant Android N Support
• Continued support for upcoming Knox
2.7 and Knox 2.8 releases
• More OEM APIs including support for
mainstream & rugged devices
Easier Provisioning • Bulk Enrollment & Easier Knox enrollment for Android N
• Enhanced usability for Kiosk mode
16 IBM Security 16 © 2016 IBM Corporation
IBM CONFIDENTIAL
Delivering Solutions with Android Kiosk mode
With MaaS360, Android for Work, Samsung Knox and Standard Android you can get Android
devices to deliver required functionality securely on Kiosk mode
Easier Provisioning & Increased Support • Easy deployment via policies
• Support for Android for Work (COSU), Samsung Knox and Standard Android
• Customizable to various available modes
• Whitelist required apps
• Control Kiosk Launcher settings on the device
• Silent install of app upgrades
• Manage access to device controls
Usability Enhancements • Widgets support
• Customized Wi-Fi and Bluetooth settings
• Ordering of apps on launcher screen
• Auto rendering of app as per screen orientation on rotation
Android Kiosk mode
Extensive Support
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express
or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may
change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and
other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or
product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are
designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.
IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
FOLLOW US ON:
THANK YOU
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.
Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Legal notices and disclaimers
IBM CONFIDENTIAL