+ All Categories

Ibm

Date post: 28-Jan-2015
Category:
Upload: meda-conferences
View: 702 times
Download: 2 times
Share this document with a friend
Description:
 
Popular Tags:
19
Omri Holzman Security Services manager [email protected] IBM Mobile Strategy Working securely anywhere, anytime, from any device © 2012 IBM Corporation
Transcript
Page 1: Ibm

Omri HolzmanSecurity Services [email protected]

IBM Mobile StrategyWorking securely anywhere, anytime, from any device

© 2012 IBM Corporation

Page 2: Ibm

Mobility is a significant component of the evolution of computing.

Client server

Webdesktop

Mobilewirelesscloud

@

Security risks

© 2012 IBM Corporation

Host

mainframe

of devices used for business in 2012 will be owned by the individual1

62%Consumerization of IT

mobile applications will be downloaded in 2012, up from 38 billion in 20113

85BMobile applications

increase in security risk driven by proliferation of mobile data and devices2

8XSecurity risks

Sources: 1. IDC, “Worldwide Business Use Smartphone Forecast and Analysis,” doc #225054, September 2010; 2. IBM X-Force 2011 Trend and Risk Report, March 2011; 3. IDC, “Predictions 2012: Competing for 2020,” p. 8, doc #231720

Page 3: Ibm

Banking Insurance Healthcare Telecom Retail Government Others

Mobile presents an enormous set of opportunities to enterprises across all industries.

Existing Enterprise Applications and Infrastructure Platform

© 2012 IBM Corporation3

Extending businessto mobile customers

and workforce

Improve operational efficiencies and reduce

costs

Differentiate the customer experience

Enable new services and business models

Business Results

User Notification

3rd Party Mobility Services

Location Services

Mobile Payments

Social Mobile Commerce

Customer Careand Insights

Workforce Optimization

Product andService Innovation

Social Collaboration

Page 4: Ibm

• “Consumerization of IT” forcing CIOs to have BYOD policy and

plan; provide employee device choice

• Anytime, anywhere, any device access now standard

• Social business interactions are increasingly important

Yet, mobile brings business and IT challenges…

Business and IT change

• Protection of privacy and confidential information

© 2012 IBM Corporation

• Infrastructure complexity from multiple device platforms

• Unique mobile requirements for employees/workers

• Extending data, voice and video applications to mobile devices

• Integrating across wireline/wireless LAN platforms

Security and management

• Protection of privacy and confidential information

• Policies for client-owned smartphones and tablets

• Visibility, security and management of mobile platform

requirements

Complexity and integration

Page 5: Ibm

A successful mobile enterprise starts with a step-by-step approach.

�Develop mobile strategy and establish corporate policy

�Enable corporate e-mail, contact and calendar

1 4

© 2012 IBM Corporation

�Enable mobile network infrastructure

�Secure mobile devices

�Develop application strategy

�Deploy and manage applications

2

3

5

6

Page 6: Ibm

Mobile

Develop mobile strategy and establish corporate policy

Scope: Business to consumer and business to

enterprise. What business problem am I trying

to solve with mobility?

Corporate policy: Is there a corporate policy that

speaks to Bring Your Own Device? (BYOD)

Do I need an acceptable use policy? What’s

the policy for mobile expense reimbursement

and arrangements with mobile carriers?

Security and compliance: What are the corporate

1Probing Questions:

© 2012 IBM Corporation6

Security and compliance: What are the corporate

security and compliance requirements and

how are they enforced?

Support: What devices are supported? How is

support provided? Can I leverage automation

or self-service support to reduce costs?

We need to reset the agenda from just Mobile Device Management to:

Effective management of all of a mobile worker’s

devices including the life-cycle of the development,

testing, deployment and remediation of their critical

mobile applications.

Page 7: Ibm

Mobile

Enable mobile network infrastructure

Challenge: To securely connect smart phones and tablets to the corporate network to access

enterprise data

Wi-Fi coverage at corporate locations for employees and guests

Network access control

2

© 2012 IBM Corporation7

Virtual Private Network (VPN) access when away from the office and accessing enterprise

data behind the corporate firewall

Page 8: Ibm

Mobile

Secure mobile devices

Top security concerns

• Lost and stolen devices

• Data leakage

• Unauthorized access to corporate

resources

• Spread of malware infections from mobile

devices to the company network

3

© 2012 IBM Corporation8

devices to the company network

• Separation of work and personal data

Solutions

• Mobile Device Management

• Mobile Data Management

• Anti-malware

• Cloud and on-premise solutions

Page 9: Ibm

Mobile

Enable corporate e-mail, contact and calendar

� E-mail, contacts and calendar

� Lotus Domino, Microsoft Exchange

� Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry

Enterprise Server, Good for Enterprise

� Native e-mail and third party clients

4

© 2012 IBM Corporation9

Page 10: Ibm

Mobile

Develop application strategy� Business to employee and business to consumer

� Collaboration, Social media, Business analytics, Line of

� business applications

� Network and security considerations

� Buy vs. build

� Mobile application architectures: native, web, hybrid, virtual

� Development tools: xPages, Objective-C, Java, Mobile

� Enterprise Application Platform (MEAP)

5

© 2012 IBM Corporation10

Page 11: Ibm

Mobile

Deploy and manage applications

Business to consumer and business to enterprise

Distribute, update, manage, and secure mobile

applications on both personal and corporate-

owned mobile devices

Mobile application lifecycle management

6

© 2012 IBM Corporation11

Mobile application lifecycle management

Mobile application security & compliance

management

Many Mobile Device Management solutions

provide Mobile Application Management features

as well

Page 12: Ibm

Mobile

Build, connect, manage and secure your mobile enterprise

IBM Mobile Foundation

Includes

• IBM Worklight

• IBM WebSphere Cast Iron

• IBM Endpoint Manager for Mobile IBM Mobile Foundation

© 2012 IBM Corporation12

• IBM Endpoint Manager for Mobile Devices

Foundation

Plus Services Offering

• Mobile infrastructure Strategy and Planning

• IBM hosted Mobile Device Security

• Managed Mobility

• Mobile application platform management

Page 13: Ibm

Mobile

Fast and cost-effective development, integration and management of rich, cross-platform mobile

applications

Delivering for multiple mobile platformsIBM Worklight

Client Challenge

Key Capabilities

Using standards-based technologies and tools and delivering an enterprise-grade services layer that meets the needs of mobile employees and customers

© 2012 IBM Corporation13

Key Capabilities

Mobile optimized middleware

• Open approach to 3rd-party integration

• Mix native and HTML

• Strong authentication framework

• Encrypted offline availability

• Enterprise back-end connectivity

• Unified push notifications

• Data collection for analytics

• Direct updates and remote disablement

• Packaged runtime skins

Worklight is not only about

mobile app UI creation! It is a full

mobile middleware

Page 14: Ibm

Mobile

End User

• Personal Mail / Calendar• Personal Apps

Corporate Profile• Enterprise Mail / Calendar

Secured by BigFix policyEndpoint Manager for Mobile

Devices – The Solution

Enable password policies

Enable device encryption

Force encrypted backup

Disable iCloud sync

Access to corporate email,

apps, VPN, WiFi contingent on

© 2012 IBM Corporation14

iCloud

iCloud

SynciTunes

Sync

VPN / WiFi Corporate

Network

Access

• Enterprise Mail / Calendar• Enterprise Access (VPN/WiFi)• Enterprise Apps (App store or

Custom)

Encryption Enabled

apps, VPN, WiFi contingent on policy compliance!

Selectively wipe corporate data

if employee leaves company

Fully wipe if lost or stolen

IBM & Business Partner Confidential

Page 15: Ibm

Mobile

Hosted Mobile Device Security, fully managed service that can help protect mobile devices used by employees to access corporate data

Our solution can provide the most important security controls:

Data protection for unattended, lost or stolen devices

Threat mitigation to help protect against spyware and viruses that can infect mobile devices and

© 2012 IBM Corporation1515

and viruses that can infect mobile devices and corporate systems when the devices connect to the network

Risk mitigation by helping to limit access to applications that can expose the corporation to liability

Insider threat investigation tools

Encrypted connectivity between the device and the corporate network

Page 16: Ibm

Mobile

Network Team

Finance / Cost Control

Security / Compliance

Mobility and BYOD: It is a company-wide project…

© 2012 IBM Corporation16

Human Resources

Endpoint Team

Application Team

Page 17: Ibm

Mobile

Network Team

Network Team

Finance / Cost Control

Security / Compliance

…which needs to be considered and planned very

carefully..

Networking Strategy & Optimization / Network

Managed Services

Telecom Expense Management

Hosted Device /

© 2012 IBM Corporation17

HR

Application Team

Endpoint Team

Hosted Device / Managed Security

Services

Mobile Infrastructure Strategy & Planning / Managed Mobility

Mobile Strategy / Policy Consulting

Mobile Application Platform

Management

Page 18: Ibm

Mobile

IBM provides range of mobility services, that when

bundled can improve competitiveness

TEM

TEM

MDMCustomer

B

TEMSecure Mobile

Messaging

MDMCustomer

Network

VirtualDesktop

© 2012 IBM Corporation18

| November 5, 2012 Not for

MDMCustomer

ANetwork

B

AppsSecurity

MDMC

Network

AppsSecurity

SecurityAntivirus

Page 19: Ibm

© 2012 IBM Corporation19


Recommended