Your SlideShare is downloading. ×
AN IV SF IBM Keynote - Phil Buckellew
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

AN IV SF IBM Keynote - Phil Buckellew

943
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
943
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • MAIN POINT: CEO’s are prioritizing customer insights far above other decision areasAnd yet many are realizing mobile can help them get a CA in their industry ... and transform there industry.The 2012 IBM CEO Study, Leading Through Connections, identifies and analyzes this trend through the eyes of more than 1,700 CEOs and public sector leaders
  • MAIN POINT: Design, IT and LOB must all be involved in a successful mobile app development initiative. This was seen by TBC who [segway to next slide]
  • TBC Corporation is one of the largest vertically integrated sellers of tires for the automotive replacement market. TBC markets on a wholesale basis to regional tire chains and distributors serving independent tire dealers throughout the United States, Canada and Mexico. Business Need: TBC wanted to ensure that its customers were having a consistent experience whether they were visiting the company’s websites from a PC or a mobile device. Solution Summary: TBC implemented IBM Worklight software, which enables the company to write a single instance of code that can be deployed on multiple mobile device platforms, such as Android and Mac iOS. Benefits: TBC can now deliver a consistent user experience across multiple mobile devices faster while using fewer development resources.http://w3.ibm.com/sales/ssi/cgi-bin/ssialias?appname=crmd&subtype=cs&infotype=rf&htmlfid=CPAR-8WBRLN
  • MAIN POINT: IBM has invested substantially in mobile to create a broad solutions portfolio to help clients embrace mobile
  • MAIN POINT: IBM strategy address the three key client mobile initiatives Build, connect, and run a growing portfolio of mobile apps for customers, partners and employees Manage and secure mobile applications, services and data on a variety of mobile devices and operating systems Extend and transform the business to yield new opportunities and business models while extending existing business capabilities to mobile employees, customers, and partnersSPEAKER NOTES:In today’s mobile world enterprises are transforming the way they interact with their customers, partners and employees by implementing mobile strategies. We’ve heard from clients around the world about the key initiatives they have in the mobile space. They can be categorized in these three simple ways. They want to: Build, connect, and run a growing portfolio of mobile apps for customers, partners and employees Manage and secure mobile applications, services and data on a variety of mobile devices and operating systems Extend and transform the business to yield new opportunities and business models while extending existing business capabilities to mobile employees, customers, and partnersEach of these initiative has a some key capabilities that must be delivered.  Within Build & Connect you have to effectively develop mobile apps and choose the type of app that best addresses your needs – whether it’s web, hybrid or native.  You have to integrate enterprise data, services, applications and systems.  You have to address your wireless networking capabilities to make sure the mobile connections are sound.  Within Manage & Secure you must manage the entire mobile lifecycle – from the device and the app to the infrastructure.  You must have appropriate controls and analytics across devices.  You have to make sure your network communications are secure and managed effectively. Within Extend & Transform you must be able to incorporate mobile effectively from the strategy to the plan to the implementation.  You need to determine and deliver the right mobile solutions for you and your industry.  Mobile must be a service you offer – either yourself or through a partner.  IBM’s strategy directly addresses this set of initiatives, enabling our clients to deliver a comprehensive set of solutions to meet their customer's mobile demands and seize the opportunities that the mobile world provides while reducing cost and complexity. 
  • MAIN POINT: IBM recently announced several key capabilities to our mobile portfolio spanning the end-to-end needs of the mobile enterprise. [Details on each announcement are below]SPEAKER NOTES:IBM WorklightManage enterprise mobile app distribution and socialize feedback from development through deployment For audience: Chief Information Officer, Chief Tech Office and Tech Research, Software Design and Development, IT Strategy and Enterprise Architecture, and Integration Development.Who need: [Manage & Secure] When a B2E mobile app is ready for deployment, it often requires time consuming and error prone manual processes to move it from development tools to distribution services such as an app store.IBM can help: Streamlined, single click transition of mobile apps from development to production delivery servicesEnabled by: IBM Mobile Foundation 5.0.5 and IBM Worklight 5.0.5IBM Worklight and Mobile foundation will deliver a comprehensive and flexible approach to mobile application governance.IBM Worklight provides the Worklight Application Center - an enterprise app store for production apps.Customers now have a comprehensive solution for building, testing, socializing, emulating, simulating, and now deploying mobile apps. Unlike others in the market, the Worklight Application Center supports the development and test process and allows line-of-business users to participate in the development process. It imbeds social capabilities that helps lower the barrier of participation, so that the right stakeholders can engage in the mobile development process.Once the development process is completed, the Worklight Application Center can function as an enterprise app store, providing a place to deploy mobile applications with appropriate access control and role based security. In addition, the process of moving mobile applications from development within IBM Worklight to production deployment with IBM Endpoint Manager for Mobile Devices for those customers who choose to do so, is simple - users can seamlessly move apps between the two environments, saving time and eliminating potential errors inherent to manual processes. A Worklight mobile app will then be in communication with the Worklight server for the purposes of app management, analytics, etc.__________________________________________________________________IBM Endpoint Manager for Mobile DevicesSpeed up enrollment and management of BYOD and enterprise devicesFor audience: Primary: CIO, Secondary: VP Messaging & Network Ops or VP User / Desktop Management (MDM buyer), CISOWho need: [Manage & Secure] Organizations want to minimize the effort, deployment timeline, and costs of enterprise on-boarding of employee- and company-owned mobile devices.Organizations want to support as wide a range of hardware and OS options in their BYOD programs as possible, while ensuring they can protect the organization from loss of sensitive data.IBM can help: Streamlined deployment and management options reduce roll-out times, increase end-user satisfaction, and lower service desk utilization. Advanced BYOD capabilities enable clients to support more platforms and more devices faster, while ensuring data separation on employee-owned devices. These capabilities enable project cost reduction and accelerated realization of employee productivity improvements.Enhanced data separation capabilities to satisfy BYOD requirements for both employees and employers through NitroDesk TouchDown and Samsung SAFE integration.Windows Phone 8 and Office 365 supportSelf-service portal with secure login for employees to manage and secure their own devices: remote lock, wipe, password reset, view current location. etc.Communicate security alerts and device management notices with Android devices utilizing Google Cloud Messaging Enabled by: IBM Endpoint Manager for Mobile Devices 2.0End-user responses to customizable enrollment questions enable unique policy targeting and reporting capabilities and acceptance of custom EULA. This capability is unique to IBM.A new Setup & Configuration Wizard simplifies installation to improve time-to-value.__________________________________________________________________IBM Mobile Enterprise Services for managed mobilitySimplify enterprise mobile services and address today’s BYOD and mobile security challengesFor audience: Chief Information OfficerWho need: Challenges managing security, complexity and costs of Bring Your Own Device (BYOD) and proliferation of mobile devices in the enterprise. IBM can help: Boost mobile productivity with improved uptime and security-rich access to corporate dataMore control over a broad range of mobile devicesAccelerate provisioning and configuration of devicesReduce TCO and hidden mobility costs through predictable, subscription-based pricingLifecycle management of physical devices and OS.Enabled by: IBM Mobile Enterprise Services for managed mobilityEnables clients with deployment, ongoing management and support for BlackBerry, Apple, Android, and Windows mobile devices. Includes self service portal, over the air device management, end user support, and security. Expanded service for Apple iOS, Google Android, RIM BlackBerry®, Microsoft Windows smartphones, tablets and rugged devices managed with subscription-based pricing__________________________________________________________________Mobile Infrastructure Strategy and Planning Provides a complete mobile infrastructure strategy Assesses the current mobility environment against industry best practices to identify gaps Identifies important aspects of mobility which may not have been considered Helps mitigate risks properly planning for the right services and improvements Accelerate deployment by building support for mobility initiatives and remove impedimentsTwo consulting options:1) Accelerator workshop (4-6 weeks) Focused on establishing a mobile infrastructure strategy2) Strategy assessment (6-8 weeks) Includes accelerator contentBuilds the strategic roadmap to mobile__________________________________________________________________See below regarding differentiation of Mobile Accelerator from GBS and Mobile Infrastructure Strategy and Planning services from GTS.GTS focuses on the infrastructure while GBS focuses on the applications. Here are some bullet points that will help distinguish the two. GBSFocus on applications and application development (B to C, B to B, and B to E apps)Identify back- end applications that can be mobilizedMobile Application ArchitectureGTSMobile Infrastructure strategy including Mobile Device Management, Mobile Application ManagementBring Your Own Device Strategy
  • MAIN POINT: Manage enterprise mobile app distribution and socialize feedback from development through deployment with IBM WorklightFor audience: Chief Information Officer, Chief Tech Office and Tech Research, Software Design and Development, IT Strategy and Enterprise Architecture, and Integration Development.Who need: [Manage & Secure] When a B2E mobile app is ready for deployment, it often requires time consuming and error prone manual processes to move it from development tools to distribution services such as an app store.IBM can help: Streamlined, single click transition of mobile apps from development to production delivery servicesEnabled by: IBM Mobile Foundation 5.0.5 and IBM Worklight 5.0.5IBM Worklight and Mobile foundation will deliver a comprehensive and flexible approach to mobile application governance.IBM Worklight provides the Worklight Application Center - an enterprise app store for production apps.Customers now have a comprehensive solution for building, testing, socializing, emulating, simulating, and now deploying mobile apps. Unlike others in the market, the Worklight Application Center supports the development and test process and allows line-of-business users to participate in the development process. It imbeds social capabilities that helps lower the barrier of participation, so that the right stakeholders can engage in the mobile development process.Once the development process is completed, the Worklight Application Center can function as an enterprise app store, providing a place to deploy mobile applications with appropriate access control and role based security. In addition, the process of moving mobile applications from development within IBM Worklight to production deployment with IBM Endpoint Manager for Mobile Devices for those customers who choose to do so, is simple - users can seamlessly move apps between the two environments, saving time and eliminating potential errors inherent to manual processes. A Worklight mobile app will then be in communication with the Worklight server for the purposes of app management, analytics, etc.
  • MAIN POINT: There are many mobile analytics solutions out there that do a great job of reporting what is taking place. However, Tealeaf helps you not only understand what is happening but why so you can take appropriate action to address it before you read about it through user feedback …CX Mobile provides multiple ways to understand what is taking place and why:Your Mobile team can Examine the event logsView screen captures or Replay what each user did screen-by-screenFor mobile web, we capture device demographics so you know how your users are accessing you.Our SDK lets you see what actions the users are taking with your site such as pinching, zooming, swiping or rotatingLastly, we let you replay page-by-page exactly what the user saw when they interacted with your mobile web siteWe support both iOS and Android native appsOur logging framework is intelligent and passive which means that we let you configure how much or how little information you want to captureThe info logged is also sent when the network is not in use so it had minimal impact to your user’s experience
  • Why AppScanAppScan is a recognized market leader. Identified by Gartner as a market leader in their Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) Magic Quadrant reports.AppScan already provided application security testing for web-based applications; it is a natural and expected product line extension to focus on mobile application security.AppScan Source already supported the analysis of Java applications; Android applications are written in Java; so supporting the analysis of Android applications was straight forward Value PropositionMobile application security solution is based on AppScan Source; it provides security analysis of the source code; it allows organizations to address security risk in development and early in the software development life cycleSecurity failures associated with mobile applications are no different than web-based enterprise hosted applications; one banking company developed an application where username and password information were not encrypted; set sent a letter to customers urging them to update to a more secure version of their mobile application Problem SolvedSomehow, malware works its way onto a phone through social engineering exploits or even by downloading a malicious app from a valid app store. The corporate risk is data leakage and there are many different kinds of leakage. The problem is enterprise applications are not protecting the data from malware. The data isn’t really leaking – it’s being stolen without the users knowledge. Fraudulent use of the application is really an abuse of privileges; it is more of a concern for consumers. Malware may send expensive text messages without the users permission or knowledge. AppScan identifies what data enters the application, where it goes inside the application, and where it leaves the application. This makes it easier to identify security risk and helps mobile application developers protect important data. QR Code ExampleNot all security risk is a function of malware. Malicious input can enter mobile applications from interesting sources such as a QR (quick response) code. Increasingly, companies are using QR codes to provide information for use in marketing promotions. However, users have no idea what data is being provided from the QR code. It could easily open a browser to in appropriate content or direct to a site that encourages you to download a malicious application. [Android support available now; iOS available Q1 2013, Hybrid available Q2 2013]  
  • MAIN POINT: IBM has delivered on the existing BigFix roadmap, ported existing Tivoli products with complementary capability to this platform, and integrated with our security, service management, and asset management technologies.IBM acquired BigFix in mid 2010 for its unique architecture. This architecture is light weight, highly scalable, and flexible enough to work in any environment. It is also a platform that enables rapid development and integration, In the last 18 months, IBM has completely re-branded the product; delivered on the existing BigFix roadmap; ported Tivoli Remote Control,and Tivoli Provisioning Manager for OS Deployment to this platform; and integrated with IBM Security Server Protection for Windows, IBM Proventia Desktop Endpoint Security, Tivoli Asset Manger for IT, Tivoli Service Request Manager, and Tivoli Change and Configuration Management Database; and supported Trend Micro's integration of Anti-Malware and Data Loss Prevention technologies on the platform.And now we are announcing the extension of support for over 90 OS versions to include four more: iOS, Android, Symbian, and Windows Phone as IBM Endpoint Manager for Mobile Devices. In addition to the advanced management and security capabilities already expected in this category, IBM Endpoint Manager for Mobile Devices inherits the scalability, real-time reporting, and integration points of the BigFix platform. In fact, IBM will be extending its existing 500,000 desktop and laptop deployment to include mobile devices this year.Introduced in March 2012:Advanced management for iOS, Android, Symbian, and Windows PhoneUnified management automatically enables VPN access based on security complianceIntegration with back-end IT management systems such as service desk, CMDB, and SIEMSecurity threat detection and automated remediationExtends IBM’s existing 500,000 endpoint deployment
  • MAIN POINT: IBM recently announced several key capabilities to our mobile portfolio spanning the end-to-end needs of the mobile enterprise. [Details on each announcement are below]SPEAKER NOTES:IBM WorklightManage enterprise mobile app distribution and socialize feedback from development through deployment For audience: Chief Information Officer, Chief Tech Office and Tech Research, Software Design and Development, IT Strategy and Enterprise Architecture, and Integration Development.Who need: [Manage & Secure] When a B2E mobile app is ready for deployment, it often requires time consuming and error prone manual processes to move it from development tools to distribution services such as an app store.IBM can help: Streamlined, single click transition of mobile apps from development to production delivery servicesEnabled by: IBM Mobile Foundation 5.0.5 and IBM Worklight 5.0.5IBM Worklight and Mobile foundation will deliver a comprehensive and flexible approach to mobile application governance.IBM Worklight provides the Worklight Application Center - an enterprise app store for production apps.Customers now have a comprehensive solution for building, testing, socializing, emulating, simulating, and now deploying mobile apps. Unlike others in the market, the Worklight Application Center supports the development and test process and allows line-of-business users to participate in the development process. It imbeds social capabilities that helps lower the barrier of participation, so that the right stakeholders can engage in the mobile development process.Once the development process is completed, the Worklight Application Center can function as an enterprise app store, providing a place to deploy mobile applications with appropriate access control and role based security. In addition, the process of moving mobile applications from development within IBM Worklight to production deployment with IBM Endpoint Manager for Mobile Devices for those customers who choose to do so, is simple - users can seamlessly move apps between the two environments, saving time and eliminating potential errors inherent to manual processes. A Worklight mobile app will then be in communication with the Worklight server for the purposes of app management, analytics, etc.__________________________________________________________________IBM Endpoint Manager for Mobile DevicesSpeed up enrollment and management of BYOD and enterprise devicesFor audience: Primary: CIO, Secondary: VP Messaging & Network Ops or VP User / Desktop Management (MDM buyer), CISOWho need: [Manage & Secure] Organizations want to minimize the effort, deployment timeline, and costs of enterprise on-boarding of employee- and company-owned mobile devices.Organizations want to support as wide a range of hardware and OS options in their BYOD programs as possible, while ensuring they can protect the organization from loss of sensitive data.IBM can help: Streamlined deployment and management options reduce roll-out times, increase end-user satisfaction, and lower service desk utilization. Advanced BYOD capabilities enable clients to support more platforms and more devices faster, while ensuring data separation on employee-owned devices. These capabilities enable project cost reduction and accelerated realization of employee productivity improvements.Enhanced data separation capabilities to satisfy BYOD requirements for both employees and employers through NitroDesk TouchDown and Samsung SAFE integration.Windows Phone 8 and Office 365 supportSelf-service portal with secure login for employees to manage and secure their own devices: remote lock, wipe, password reset, view current location. etc.Communicate security alerts and device management notices with Android devices utilizing Google Cloud Messaging Enabled by: IBM Endpoint Manager for Mobile Devices 2.0End-user responses to customizable enrollment questions enable unique policy targeting and reporting capabilities and acceptance of custom EULA. This capability is unique to IBM.A new Setup & Configuration Wizard simplifies installation to improve time-to-value.__________________________________________________________________IBM Mobile Development Lifecycle SolutionEnact a collaborative, multi-platform mobile development lifecycleFor audience: Chief Information Officer; Application Development and Test Organization; OperationsWho need: [Build & Connect] Code construction is just one aspect of mobile application development. Development includes planning, design, code construction, testing, and deployment. To help ensure that applications are delivered on-time, are of high quality, and meet business objectives, a comprehensive, team-based mobile development solution is needed. IBM can help: Enhanced development capabilities that can help produce higher application quality, faster time-to-market, reduced development and test costs, and increased ability to meet business and customer demands__________________________________________________________________IBM Security Access ManagerIncrease precision of identifying risk associated with anytime/anywhere mobile access to enterprise systemsFor audience: Chief Information Security Officer, CIOWho need: [Manage & Secure] Business desires to deliver context aware mobile user security to improve assurance and enable the definition of custom mobile-specific authentication schemes. Organization requires centralized web access management and SSO for mobile users to demonstrate compliance. Enterprise wants to employ threat protection for mobile traffic. IBM can help: Deliver user security that adapts to the requirements of the context in which access is made and allows enhanced user experienceEnabled by: IBM Security Access Manager (ISAM) for Cloud and Mobile (FIM v6.2.2 SPM v7.1.0.4)Provides mobile user access and single sign-on with context based access controlRisk-Based Access features:Mobile device & app attributes for risk calculation and scoringPolicy templates for location/network/time fencing OAuth 2.0, OpenID for federated SSOMobile Authentication features:One Time Password Threat Protection: packet analysis module__________________________________________________________________IBM mobile solutions for social businessIBM mobile solutions for social business help make your workforce smarter and delight customers—anywhere, any time. Mobile enhancements create new ways for employees, partners and customers to engage anywhere. IBM mobile solutions for social business help make your workforce smarter and delight customers—anywhere, any time. They include: Push email, calendar, contactsSocial software for access to your professional networkPresence, IM chat, telephony, online meetingsBusiness document viewerExceptional web experiencesMobile enhancements create new ways for employees, partners and customers to engage anywhere:1) Enhancements in Connections 4 mobile support: to help employees stay on top of key business activities and processes in a security-rich environmentA personalized list of key activities (“activity stream”) in one place for people to view and respond to while on the go so they can keep engaged with their professional networks and communitiesGeo-location (user choice) to find nearby colleagues and to help them find you.Added security provided through local/remote data wipe Also delivered in IBM Connections Suite V2, which provides IBM Connections, IBM Sametime, IBM Sametime Unified Telephony Lite Client and IBM Filenet Content Manager (restricted use) and IBM Lotus Quickr Connectors.2) Enhancement in IBM Exceptional Web Experience solutions is the WebSphere Portal entitlement to IBM Worklight, which provides two Worklight apps: This provides expanded capabilities across all delivery methods (multi-channel) providing integrated, personalized web experiences to employees, partners and customers anytime Including mobile device specific featuresConsistent messaging and content across web experience platforms -- web, mobile web and mobile hybridEnables distribution of hybrid apps in app stores-------------------------------------------------------------------------------------------------------------------Background on audiences and capabilities they care about:1) For audience: CMO and other business executives (LoB). Secondary: COO, Product Design & Development, Human Resources (as key influence), IT Manager Messaging and Collab ArchitectureWho need: [Extend & Transform] to disrupt their industries and create competitive advantage..IBM can help: Create a smarter workforce, in which the right people can engage with the right community to tap into the collective intelligence.Create exceptional customer experiences, where customers are engaged on their own terms and become advocates. Enabled by: IBM mobile solutions for social business, including the enhancement detailed above-------------------------------------------------------------------------------------------------------------------2) For audience: CIO, Secondary: COO, IT Strategy and Enterprise Architecture, Software Design and Development, Messaging / Collaboration Architecture, CMO, CHROWho need: [Build & Connect] to provide multi-channel web experiences that help them provide excellent customer service and improve workforce effectiveness—wherever (and from whatever device) they are accessing the web resources.IBM can help: IBM Exceptional Web Experience Suite offerings help businesses anticipate customer needs and allow customers, business partners and/or employees to engage when, where and how they want. Enabled by: WebSphere Portal 8.0 Worklight Entitlement, discussed above-------------------------------------------------------------------------------------------------------------------3) For audience: Chief Information Security Officer, Secondary: Information Security and Operations, CIO, Chief Tech Officer/Tech Research, Operations Mgmt/System Admin.Who need: [Manage & Secure] IT is looking for enterprise- ready collaboration offerings that provide the capabilities the workforce needs while helping protect enterprise resources. IBM can help: provide the capabilities the workforce needs while helping IT protect enterprise resources. Enabled by: IBM Connections 4 (and IBM Connections Suite V2.0)Mobile support for offline file access, which has data loss prevention policies, including data wipe, to help secure files (versus less-secure dropbox options). __________________________________________________________________IBM Mobile Enterprise Services for managed mobilitySimplify enterprise mobile services and address today’s BYOD and mobile security challengesFor audience: Chief Information OfficerWho need: Challenges managing security, complexity and costs of Bring Your Own Device (BYOD) and proliferation of mobile devices in the enterprise. IBM can help: Boost mobile productivity with improved uptime and security-rich access to corporate dataMore control over a broad range of mobile devicesAccelerate provisioning and configuration of devicesReduce TCO and hidden mobility costs through predictable, subscription-based pricingLifecycle management of physical devices and OS.Enabled by: IBM Mobile Enterprise Services for managed mobilityEnables clients with deployment, ongoing management and support for BlackBerry, Apple, Android, and Windows mobile devices. Includes self service portal, over the air device management, end user support, and security. Expanded service for Apple iOS, Google Android, RIM BlackBerry®, Microsoft Windows smartphones, tablets and rugged devices managed with subscription-based pricing__________________________________________________________________Mobile Infrastructure Strategy and Planning Provides a complete mobile infrastructure strategy Assesses the current mobility environment against industry best practices to identify gaps Identifies important aspects of mobility which may not have been considered Helps mitigate risks properly planning for the right services and improvements Accelerate deployment by building support for mobility initiatives and remove impedimentsTwo consulting options:1) Accelerator workshop (4-6 weeks) Focused on establishing a mobile infrastructure strategy2) Strategy assessment (6-8 weeks) Includes accelerator contentBuilds the strategic roadmap to mobile__________________________________________________________________See below regarding differentiation of Mobile Accelerator from GBS and Mobile Infrastructure Strategy and Planning services from GTS.GTS focuses on the infrastructure while GBS focuses on the applications. Here are some bullet points that will help distinguish the two. GBSFocus on applications and application development (B to C, B to B, and B to E apps)Identify back- end applications that can be mobilizedMobile Application ArchitectureGTSMobile Infrastructure strategy including Mobile Device Management, Mobile Application ManagementBring Your Own Device Strategy
  • Transcript

    • 1. APPNATION IVSAN FRANCISCO, CADECEMBER 11-12, 2012
    • 2. Speeding Innovation andExtending ReachSecurely with MobileEnterprisePhil Buckellew, @buckellewVice President, IBM Enterprise Mobile © 2012 IBM Corporation
    • 3. Mobile was a Key Driver in 2012 Black Friday and Cyber Monday Holiday Shopping YtY increase in mobile traffic to online retailers during the two days Apple’s iPhone and iPad accounted for 77% of all mobile shopping during the two days YtY increase in mobile sales during Cyber Monday3 Source – IBM Coremetrics Retail Data – as published in 11/24/12 IBM Press Release © 2012 IBM Corporation
    • 4. Top Three Areas of Focus for CEOs Insights from the IBM Global Chief Executive officer Study CEOs are prioritizing customer insights far above other decision areas.4 © 2012 IBM Corporation
    • 5. CIOs Perception of Mobility of CIOs plan to allow staff to use personal mobile devices to access company data and applications. of CIOs cite cost as a critical challenge. Almost all the CIOs said they expect to deploy more than 25 mobility of CIOs say report strong applications in laptops demand from the next two could be years. replaced by employees to tablets in support a wide the coming range years. of mobile devices.5 A report from McKinsey & Company: Based on a survey of 250 CIOs on their mobility © 2012 IBM Corporation strategies.
    • 6. Enterprises are Lagging in Adequate Mobile Skill Sets in Both Mature and Growth Markets The IT Skill Gap: Mature vs Growth Markets Have All The Necessary Moderate Skill Gaps Major Skill Skills Gaps Source: 2012 Tech Trends Study, IBM developerWorks and IBM Center for Applied Insights, November 2012..6 Growth Markets including Brazil, Russia, China, India and South Africa. © 2012 IBM Corporation
    • 7. The Key to Successful Mobile App Development Starts With Design, IT and LOB Working Side By Side Design IT LOB7 © 2012 IBM Corporation
    • 8. TBC is Using Mobile to Transform their Business Model Build mobile applications Connect to, and Run backend systems in support of mobile No longer just a company who provides tires and services around the car, they now provide services to the owner about their car overall.8 © 2012 IBM Corporation
    • 9. IBM Mobile Momentum Jan 2012 April 2012 June 2012 Oct 2012 IBM IBM Cast Iron Tealeaf CX IBM Mobile Connect Worklight Mobile March 2012 April 2012 Oct 2012 Nov 2012 IBM Endpoint IBM Mobile IBM Security IBM Mobile Manager Foundation Access Manager Development for Cloud and Lifecycle Solution Mobile • Over a Million Devices Under Management • Over 200 Mobile Business Partners • Reached 100,000 Individuals Through Marketing Programs • Over 25,000 Participating in Mobile DeveloperWorks Community • Tripled Development Investment • Over 300 New Customers9 © 2012 IBM Corporation
    • 10. IBM Mobile Enterprise Capabilities Address the Spectrum of Needs for Successful Transformation Application Development IT Ops/CISO Line of Business Build mobile Manage mobile Extend apps devices and capabilities apps to mobile Connect & run mobile Secure my Transform systems mobile my business business • Building & Deploying • Device Management • Business Applications Apps • Network & Data Security • User Engagement • Mobile Lifecycle and Management Management and • Mobile Analytics and Testing • App Management Insight • Data Access & Integration10 © 2012 IBM Corporation
    • 11. IBM Has Invested Substantially In Mobile To Create A Broad Solutions Portfolio To Help Clients Embrace Mobile IBM Offers a Comprehensive End-to-End Mobile Platform And Services Build mobile Manage mobile Extend apps devices and capabilities apps to mobile Connect & run mobile Secure my Transform my systems mobile business business IBM Mobile Foundation IBM Social & Analytics IBM Endpoint Manager for Mobile IBM Connections, SameTime, ECM, Tealeaf Devices IBM Mobile Services IBM Interactive Design Mobile Mobile Application Infrastructure Mobile Enterprise Services Innovation Services Strategy and for Managed Mobility Planning11 © 2012 IBM Corporation
    • 12. IBM Worklight 5.0.5 New Features and Enhancements Platform Governance Tooling Capabilities • SMS • Highly available • jQuery tooling • Encryptable notifications app store support JSON database • New target • Integration with • Native libraries • Supports devices: IBM MDM (IBM for iOS and offline Windows 8, Java Endpoint Android synchronization ME Manager) • Updates: iOS6, Android 4.1, Cordova 2.2 ← Worklight Worklight Worklight Run- Worklight Worklight Studio Server time Components Console App Center12 © 2012 IBM Corporation
    • 13. Deep Application Instrumentation for Mobile Function Test Mobile Testing Tech Preview • Dynamic Instrumentation of Android Mobile Applications (without requiring source / static enablement) Key Benefits • Automated mobile function testing • Native Android support13 © 2012 IBM Corporation
    • 14. Tealeaf CX Mobile Customer Experience Management Software Apply the power of Tealeafs industry-leading customer experience management solutions to your mobile channel Visibility Speed Investment Visibility into your Rapidly evaluate Quantify business mobile usage mobile features – impact to prioritize across the user base, adoption, success decisions: fix, invest site and apps & failure points or remove14 © 2012 IBM Corporation
    • 15. AppScan Mobile Security Leading Application Security Testing Suite Why AppScan • Market Leader • Product Line Extension Which QR Code Is Evil? • Fastest Time To Market Value Proposition • Identify & remediate mobile app security early in SDLC • Protect enterprise brand Use AppScan to Problem Solved Validate URLs Before • Data leakage Opening Browsers • Confidentiality leakage (e.g. GPS) • Fraudulent use of application • Identifies what data needs protecting15 Initial support for Android © 2012 IBM Corporation
    • 16. Mobile Context Influences Risk Integration: IBM Worklight and IBM Security Access Manager Governed Policy • Context: On site inside the ER, on the • Context: At coffee shop, on an unsecured hospital network, authorized doctor network, authorized doctor on call on shift • Function: Designated features only • Function: All app features • Data: Specific encrypted data • Data: Full data access and storage • Security: Two-factor authentication • Security: Single-factor authentication16 © 2012 IBM Corporation
    • 17. Extending Visibility, Control and Automation to Mobile Devices Unified Device Mgmt One Systems Console, Security Management One Management infrastructure Endpoint Manager Desktops & Smartphones Servers Laptops & Tablets17 © 2012 IBM Corporation
    • 18. New and Updated Solutions Announced In 4Q12 Build mobile Manage mobile Extend apps devices and capabilities apps to mobile Connect & run mobile Secure my Transform mobile my business systems business • Rapid support for iOS6 • Support for native and offline IBM Social Business, apps Commerce & Analytics IBM Mobile Foundation • Extended support for BYOD • IBM Connections 4 Mobile • Enterprise and App Store leveraging location linkage services • Hosted & on-premise services IBM Mobile Development IBM Security Access IBM Tealeaf CX Mobile Lifecycle Solution Manager • Visibility into usage across • Accelerated application • Context based security the user base, site and apps delivery enabled for cloud and mobile IBM Mobile Services Mobile Application Mobile Enterprise Mobile Innovation Services Services Infrastructure for Managed Mobility Strategy and Planning18 © 2012 IBM Corporation
    • 19. Sign Up Now for the IBM Mobile Enterprise Workshop One Day No-Charge Workshop• Help you define or assess your Mobile Enterprise strategy• Develop a roadmap for both client apps and BYOD challenges• Get insights from IBMs management of millions of devices around the globe• Gain tips from IBMs market Sign up now by sending an email to: leading Interactive Design ibmmobile@us.ibm.com Team on designing mobile apps19 © 2012 IBM Corporation
    • 20. Three Ways to Get Started with IBM 1 Download the free IBM Worklight Developer Edition: ibm.co/worklightde 2 Sign up for the IBM Mobile Enterprise workshop: Email us at IBMMobile@us.ibm.com 3 Learn more at www.ibm.com/mobile- enterprise Interact with us @ibmmobile and #ibmmobile20 © 2012 IBM Corporation
    • 21. 21 © 2012 IBM Corporation
    • 22. Legal Disclaimer • © IBM Corporation 2011. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the users job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.22 © 2012 IBM Corporation

    ×