+ All Categories
Home > Technology > PCTY 2012, How IBM does BYOD v. Martin Vittrup

PCTY 2012, How IBM does BYOD v. Martin Vittrup

Date post: 18-Jan-2015
Category:
Upload: ibm-danmark
View: 623 times
Download: 5 times
Share this document with a friend
Description:
Præsen
Popular Tags:
23
How IBM does BYOD © 2012 IBM Corporation Optimizing the World’s Infrastructure Copenhagen May 22 2012
Transcript
Page 1: PCTY 2012, How IBM does BYOD v. Martin Vittrup

How IBM does BYOD

© 2012 IBM Corporation

Optimizing the World’s Infrastructure

Copenhagen May 22 2012

Page 2: PCTY 2012, How IBM does BYOD v. Martin Vittrup

2

What is BYOD

In the consumerization of IT, BYOD is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network.

BYOD is short for Bring Your Own Device

Page 3: PCTY 2012, How IBM does BYOD v. Martin Vittrup

3

Why BYOD

Consumer technology is convenient, easy to learn, and fun to use.

Consumer technology brings real business value in terms of productivity and business agility.

Users (might) pay for their own equipment.

Cutting edge technology.

Page 4: PCTY 2012, How IBM does BYOD v. Martin Vittrup

4

And why not . . .

Consumer technology is generally not as secure and manageable as required by the enterprise.

Lack of a strategic approach to the consumerization of IT creates security risks, financial exposure, and a management nightmare.

Difficult to measure improved User Productivity.

Page 5: PCTY 2012, How IBM does BYOD v. Martin Vittrup

5

Top Free iPhone Apps:1. Temple Run (Imangi Studios, LLC)2. Doodle Sprint! (Wivvu)3. Zombie Farm (The Playforge, LLC)4. the Sheeps Free (Ivan Starchenkov)5. Pocket Potions (Breaktime Studios)6. Social Girl (Crowdstar Inc.)7. Dice With Buddies Free (Stofle Designs)8. Facebook (Facebook, Inc.)9. Instagram (Burbn, Inc.)10. Global War Riot (Addmired, Inc.)

Source: App Store Official Charts January 2012ZDNet.com Blog

Top Paid iPhone Apps:1. Angry Birds (Clickgamer.com)2. Fruit Ninja (Halfbrick Studios)3. Camera+ (tap tap tap)4. Where’s My Water? (Disney)5. Words With Friends (Zynga)6. Cut the Rope (Chillingo Ltd.)7. Tiny Wings (Andreas Illiger)8. MADDEN NFL 12 (Electronic Arts)9. Bejeweled (PopCap)10. TETRIS (Electronic Arts)

Top Paid iPad Apps:1. MONOPOLY for iPad (Electronic Arts)2. Where’s My Water? (Disney)3. SCRABBLE for iPad (Electronic Arts)4. TETRIS for iPad (Electronic Arts)5. Words With Friends HD (Zynga)6. Angry Birds HD (Chillingo Ltd.)7. Pages (Apple)8. THE GAME OF LIFE for iPad (Electronic Arts)9. Real Racing 2 HD (Firemint Pty Ltd.)10. MADDEN NFL 12 by EA SPORTS For iPad (Electronic Arts)

Citrix ReceiverVNCRDP

vSphere ClientiSSH

KeynoteQuickoffice

Microsoft OneNoteIBM Sametime

Lotus Symphony ViewerFlipboard

Dragon DictationVMware ViewCalculator Pro

NumbersPlainTextDropbox

Time ZoneshypOps

SharePlus LiteZoho Docs

Page 6: PCTY 2012, How IBM does BYOD v. Martin Vittrup

6

IBM and BYOD

425.000 IT-experts

530.000 Workstations and Laptops

Large number of Mobile Devices

Strict Business Conduct guidelines

Role-based Management

Tivoli Endpoint Manager

Page 7: PCTY 2012, How IBM does BYOD v. Martin Vittrup

7

Roles

Workstation Roles• Primary workstation• Secondary workstation• Shared workstation• Personaly owned workstation• Classroom workstation• Lab workstation

User Roles• Privileged • Non-privileged

Page 8: PCTY 2012, How IBM does BYOD v. Martin Vittrup

8

Page 9: PCTY 2012, How IBM does BYOD v. Martin Vittrup

9

IT Asset Management

IT Operations IT Security and Compliance

Green IT

1 console, 1 agent, 1 server,

Tivoli Endpoint Manager

Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server •7 versions of Linux • iOS • Android • Symbian • Windows Mobile

• Network Asset Discovery

• Hardware and Software inventory

• Software Use Analysis

• Software license compliance analysis

• Patch management

• Software Distribution

• OS deployment

• Remote control

• Mobile Device Management

• Security Baselines

• Vulnerability assessment

• Network quarantine

• Multi-vendor anti-virus Management

• Endpoint protection

• Windows and Mac power management

• Wake-on-LAN

• Current power usage baselines and savings models

Page 10: PCTY 2012, How IBM does BYOD v. Martin Vittrup

10

Page 11: PCTY 2012, How IBM does BYOD v. Martin Vittrup

11

IBM Internal Project

11

2006 2007 2008 2009

Global endpoint security issues

2006 2007 2008 2009

Endpoint security issue by GEO

Americas

Europe

Asia

Page 12: PCTY 2012, How IBM does BYOD v. Martin Vittrup

1212

Count

ry A

Count

ry C

Count

ry E

Count

ry G

Count

ry I

Count

ry K

Count

ry M

Count

ry O

Count

ry Q

Count

ry S

Count

ry U

Count

ry W

Count

ry Y

Count

ry A

A

Count

ry C

C

Count

ry E

E

Count

ry G

G

Count

ry II

Count

ry K

K

Count

ry L

L

Count

ry N

N

Normalized security issues

Page 13: PCTY 2012, How IBM does BYOD v. Martin Vittrup

1313

2006 2007 2008 2009

Before TEM

Americas

Europe

Asia

2006 2007 2008 2009 2010 2011

After TEM

America

Europe

Asia

Endpoint security issues by GEO

Page 15: PCTY 2012, How IBM does BYOD v. Martin Vittrup

15

BlueMac

Page 16: PCTY 2012, How IBM does BYOD v. Martin Vittrup

16

BYOD

Key elements

• Strategi

• Policy

• Tool

Page 17: PCTY 2012, How IBM does BYOD v. Martin Vittrup

17

Ibm.com/mobile-enterpriseibm.com/tivoli/endpoint

Martin VittrupSenior Technology SpecialistIBM [email protected]

Page 18: PCTY 2012, How IBM does BYOD v. Martin Vittrup

18

Speaker instructions• IBM speakers, IF you make any reference to product/services content

that won’t be announced until after your PCTY 2012 event concludes, you must include the disclaimer language (on slide 2 here) verbatim. The disclaimer language must be on the second slide in your presentation and is in addition to the “Acknowledgements, disclaimers and trademarks” page which is to be included in all presentations (slide 7 here).

• IBM speakers, you must include the “Acknowledgements, disclaimers and trademarks” page (slide 7 here) at the end of your presentation. IF you are speaking with a customer or Business Partner, you MUST use the disclaimer slide.

Page 19: PCTY 2012, How IBM does BYOD v. Martin Vittrup

19

Please note:• IBM’s statements regarding its plans, directions, and intent are

subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline

our general product direction and it should not be relied on in making a purchasing decision.

• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.

• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.

Page 20: PCTY 2012, How IBM does BYOD v. Martin Vittrup

20

Page 21: PCTY 2012, How IBM does BYOD v. Martin Vittrup

Divider Slide

Page 22: PCTY 2012, How IBM does BYOD v. Martin Vittrup

22

Page 23: PCTY 2012, How IBM does BYOD v. Martin Vittrup

23

Acknowledgements, disclaimers and trademarks

© Copyright IBM Corporation 2012. All rights reserved.

The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.

References in this publication to IBM products, programs or services do not imply that they will be made available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not tested these products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBM products and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of those products and services.

All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and will vary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.

Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.

IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM products and services are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml


Recommended