Date post: | 28-Jan-2015 |
Category: |
Documents |
Upload: | meda-conferences |
View: | 702 times |
Download: | 2 times |
Omri HolzmanSecurity Services [email protected]
IBM Mobile StrategyWorking securely anywhere, anytime, from any device
© 2012 IBM Corporation
Mobility is a significant component of the evolution of computing.
Client server
Webdesktop
Mobilewirelesscloud
@
Security risks
© 2012 IBM Corporation
Host
mainframe
of devices used for business in 2012 will be owned by the individual1
62%Consumerization of IT
mobile applications will be downloaded in 2012, up from 38 billion in 20113
85BMobile applications
increase in security risk driven by proliferation of mobile data and devices2
8XSecurity risks
Sources: 1. IDC, “Worldwide Business Use Smartphone Forecast and Analysis,” doc #225054, September 2010; 2. IBM X-Force 2011 Trend and Risk Report, March 2011; 3. IDC, “Predictions 2012: Competing for 2020,” p. 8, doc #231720
Banking Insurance Healthcare Telecom Retail Government Others
Mobile presents an enormous set of opportunities to enterprises across all industries.
Existing Enterprise Applications and Infrastructure Platform
© 2012 IBM Corporation3
Extending businessto mobile customers
and workforce
Improve operational efficiencies and reduce
costs
Differentiate the customer experience
Enable new services and business models
Business Results
User Notification
3rd Party Mobility Services
Location Services
Mobile Payments
Social Mobile Commerce
Customer Careand Insights
Workforce Optimization
Product andService Innovation
Social Collaboration
• “Consumerization of IT” forcing CIOs to have BYOD policy and
plan; provide employee device choice
• Anytime, anywhere, any device access now standard
• Social business interactions are increasingly important
Yet, mobile brings business and IT challenges…
Business and IT change
• Protection of privacy and confidential information
© 2012 IBM Corporation
• Infrastructure complexity from multiple device platforms
• Unique mobile requirements for employees/workers
• Extending data, voice and video applications to mobile devices
• Integrating across wireline/wireless LAN platforms
Security and management
• Protection of privacy and confidential information
• Policies for client-owned smartphones and tablets
• Visibility, security and management of mobile platform
requirements
Complexity and integration
A successful mobile enterprise starts with a step-by-step approach.
�Develop mobile strategy and establish corporate policy
�Enable corporate e-mail, contact and calendar
1 4
© 2012 IBM Corporation
�Enable mobile network infrastructure
�Secure mobile devices
�Develop application strategy
�Deploy and manage applications
2
3
5
6
Mobile
Develop mobile strategy and establish corporate policy
Scope: Business to consumer and business to
enterprise. What business problem am I trying
to solve with mobility?
Corporate policy: Is there a corporate policy that
speaks to Bring Your Own Device? (BYOD)
Do I need an acceptable use policy? What’s
the policy for mobile expense reimbursement
and arrangements with mobile carriers?
Security and compliance: What are the corporate
1Probing Questions:
© 2012 IBM Corporation6
Security and compliance: What are the corporate
security and compliance requirements and
how are they enforced?
Support: What devices are supported? How is
support provided? Can I leverage automation
or self-service support to reduce costs?
We need to reset the agenda from just Mobile Device Management to:
Effective management of all of a mobile worker’s
devices including the life-cycle of the development,
testing, deployment and remediation of their critical
mobile applications.
Mobile
Enable mobile network infrastructure
Challenge: To securely connect smart phones and tablets to the corporate network to access
enterprise data
Wi-Fi coverage at corporate locations for employees and guests
Network access control
2
© 2012 IBM Corporation7
Virtual Private Network (VPN) access when away from the office and accessing enterprise
data behind the corporate firewall
Mobile
Secure mobile devices
Top security concerns
• Lost and stolen devices
• Data leakage
• Unauthorized access to corporate
resources
• Spread of malware infections from mobile
devices to the company network
3
© 2012 IBM Corporation8
devices to the company network
• Separation of work and personal data
Solutions
• Mobile Device Management
• Mobile Data Management
• Anti-malware
• Cloud and on-premise solutions
Mobile
Enable corporate e-mail, contact and calendar
� E-mail, contacts and calendar
� Lotus Domino, Microsoft Exchange
� Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry
Enterprise Server, Good for Enterprise
� Native e-mail and third party clients
4
© 2012 IBM Corporation9
Mobile
Develop application strategy� Business to employee and business to consumer
� Collaboration, Social media, Business analytics, Line of
� business applications
� Network and security considerations
� Buy vs. build
� Mobile application architectures: native, web, hybrid, virtual
� Development tools: xPages, Objective-C, Java, Mobile
� Enterprise Application Platform (MEAP)
5
© 2012 IBM Corporation10
Mobile
Deploy and manage applications
Business to consumer and business to enterprise
Distribute, update, manage, and secure mobile
applications on both personal and corporate-
owned mobile devices
Mobile application lifecycle management
6
© 2012 IBM Corporation11
Mobile application lifecycle management
Mobile application security & compliance
management
Many Mobile Device Management solutions
provide Mobile Application Management features
as well
Mobile
Build, connect, manage and secure your mobile enterprise
IBM Mobile Foundation
Includes
• IBM Worklight
• IBM WebSphere Cast Iron
• IBM Endpoint Manager for Mobile IBM Mobile Foundation
© 2012 IBM Corporation12
• IBM Endpoint Manager for Mobile Devices
Foundation
Plus Services Offering
• Mobile infrastructure Strategy and Planning
• IBM hosted Mobile Device Security
• Managed Mobility
• Mobile application platform management
Mobile
Fast and cost-effective development, integration and management of rich, cross-platform mobile
applications
Delivering for multiple mobile platformsIBM Worklight
Client Challenge
Key Capabilities
Using standards-based technologies and tools and delivering an enterprise-grade services layer that meets the needs of mobile employees and customers
© 2012 IBM Corporation13
Key Capabilities
Mobile optimized middleware
• Open approach to 3rd-party integration
• Mix native and HTML
• Strong authentication framework
• Encrypted offline availability
• Enterprise back-end connectivity
• Unified push notifications
• Data collection for analytics
• Direct updates and remote disablement
• Packaged runtime skins
Worklight is not only about
mobile app UI creation! It is a full
mobile middleware
Mobile
End User
• Personal Mail / Calendar• Personal Apps
Corporate Profile• Enterprise Mail / Calendar
Secured by BigFix policyEndpoint Manager for Mobile
Devices – The Solution
Enable password policies
Enable device encryption
Force encrypted backup
Disable iCloud sync
Access to corporate email,
apps, VPN, WiFi contingent on
© 2012 IBM Corporation14
iCloud
iCloud
SynciTunes
Sync
VPN / WiFi Corporate
Network
Access
• Enterprise Mail / Calendar• Enterprise Access (VPN/WiFi)• Enterprise Apps (App store or
Custom)
Encryption Enabled
apps, VPN, WiFi contingent on policy compliance!
Selectively wipe corporate data
if employee leaves company
Fully wipe if lost or stolen
IBM & Business Partner Confidential
Mobile
Hosted Mobile Device Security, fully managed service that can help protect mobile devices used by employees to access corporate data
Our solution can provide the most important security controls:
Data protection for unattended, lost or stolen devices
Threat mitigation to help protect against spyware and viruses that can infect mobile devices and
© 2012 IBM Corporation1515
and viruses that can infect mobile devices and corporate systems when the devices connect to the network
Risk mitigation by helping to limit access to applications that can expose the corporation to liability
Insider threat investigation tools
Encrypted connectivity between the device and the corporate network
Mobile
Network Team
Finance / Cost Control
Security / Compliance
Mobility and BYOD: It is a company-wide project…
© 2012 IBM Corporation16
Human Resources
Endpoint Team
Application Team
Mobile
Network Team
Network Team
Finance / Cost Control
Security / Compliance
…which needs to be considered and planned very
carefully..
Networking Strategy & Optimization / Network
Managed Services
Telecom Expense Management
Hosted Device /
© 2012 IBM Corporation17
HR
Application Team
Endpoint Team
Hosted Device / Managed Security
Services
Mobile Infrastructure Strategy & Planning / Managed Mobility
Mobile Strategy / Policy Consulting
Mobile Application Platform
Management
Mobile
IBM provides range of mobility services, that when
bundled can improve competitiveness
TEM
TEM
MDMCustomer
B
TEMSecure Mobile
Messaging
MDMCustomer
Network
VirtualDesktop
© 2012 IBM Corporation18
| November 5, 2012 Not for
MDMCustomer
ANetwork
B
AppsSecurity
MDMC
Network
AppsSecurity
SecurityAntivirus
© 2012 IBM Corporation19