• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
PCTY 2012, How IBM does BYOD v. Martin Vittrup
 

PCTY 2012, How IBM does BYOD v. Martin Vittrup

on

  • 794 views

Præsen

Præsen

Statistics

Views

Total Views
794
Views on SlideShare
787
Embed Views
7

Actions

Likes
0
Downloads
21
Comments
0

2 Embeds 7

http://www-05.ibm.com 6
https://duckduckgo.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    PCTY 2012, How IBM does BYOD v. Martin Vittrup PCTY 2012, How IBM does BYOD v. Martin Vittrup Presentation Transcript

    • How IBM does BYODOptimizing the World’s InfrastructureCopenhagen May 22 2012© 2012 IBM Corporation
    • What is BYODIn the consumerization of IT, BYOD is a phrase that hasbecome widely adopted to refer to employees who bringtheir own computing devices – such as smartphones,laptops and PDAs – to the workplace for use andconnectivity on the corporate network.BYOD is short for Bring Your Own Device 1
    • Why BYODConsumer technology is convenient, easy to learn,and fun to use.Consumer technology brings real business value interms of productivity and business agility.Users (might) pay for their own equipment.Cutting edge technology. 2
    • And why not . . .Consumer technology is generally not as secure andmanageable as required by the enterprise.Lack of a strategic approach to the consumerization of ITcreates security risks, financial exposure, and amanagement nightmare.Difficult to measure improved User Productivity. 3
    • Top Free iPhone Apps: Citrix Receiver 1. Temple Run (Imangi Studios, LLC) VNC 2. Doodle Sprint! (Wivvu) RDP 3. Zombie Farm (The Playforge, LLC)vSphere Client 4. the Sheeps Free (Ivan Starchenkov) 5. Pocket Potions (Breaktime Studios) iSSH Top Paid iPhone Apps: Keynote 6. Social Girl (Crowdstar Inc.) (Clickgamer.com) 1. Angry Birds 2. Fruit Ninja (Halfbrick Studios) 7. Dice With Buddies Free (Stofle Quickoffice Designs) 3. Camera+ (tap tap tap) Microsoft OneNote 8. Facebook (Facebook, Inc.) Water? (Disney) 4. Where’s My 5. Words IBM Sametime 9. Instagram (Burbn, Inc.) With Friends Paid iPad Apps: Top (Zynga) 10. Global War RiotCut theLotus Symphony Viewer (Electronic Arts) 6. (Addmired, Inc.) MONOPOLY for iPad 1. Rope (Chillingo Ltd.) 7. Tiny Wings (Andreas Illiger) Water? (Disney) 2. Where’s My Flipboard 8. MADDEN NFL 12 SCRABBLE for iPad (Electronic Arts) 3.(Electronic Arts) Dragon Dictation (Electronic Arts) 4. TETRIS for iPad 9. Bejeweled (PopCap) VMware View 5. Words With Friends HD (Zynga) 10. TETRIS (Electronic Arts) Calculator Pro (Chillingo Ltd.) 6. Angry Birds HD 7. Pages (Apple) Numbers 8. THE GAME OF LIFE for iPad (Electronic Arts) PlainText 9. Real Racing 2 HD (Firemint Pty Ltd.) Dropbox 10. MADDEN NFL 12 by EA SPORTS For iPad Time Zones (Electronic Arts)Source: App Store Official Charts January 2012ZDNet.com Blog hypOps SharePlus Lite 4 Zoho Docs
    • IBM and BYOD 425.000 IT-experts 530.000 Workstations and Laptops Large number of Mobile Devices Strict Business Conduct guidelines Role-based Management Tivoli Endpoint Manager 5
    • Roles Workstation Roles • Primary workstation • Secondary workstation • Shared workstation • Personaly owned workstation • Classroom workstation • Lab workstation User Roles • Privileged • Non-privileged 6
    • 7
    • Tivoli Endpoint Manager IT Asset IT Operations IT Security and Green IT Management Compliance• Network Asset • Patch management • Security Baselines • Windows and Mac Discovery • Software • Vulnerability power management• Hardware and Distribution assessment • Wake-on-LAN Software inventory • OS deployment • Network quarantine • Current power• Software Use • Remote control • Multi-vendor anti- usage baselines Analysis virus Management and savings models • Mobile Device• Software license Management • Endpoint protection compliance analysis 1 console, 1 agent, 1 server, Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server • 7 versions of Linux • iOS • Android • Symbian • Windows Mobile 8
    • 9
    • IBM Internal Project Global endpoint security Endpoint security issue by issues GEO Americas Europe Asia 2006 2007 2008 2009 2006 2007 2008 2009 1010
    • 11 Country A Country B Country C Country D Country E Country F Country G Country H Country I Country J Country K Country L Country M Country N Country O Country P Country Q Country R Country S Country T Country U Country V Country W Country X Country Y Country Z Country AA Country BB Normalized security issues Country CC Country DD Country EE Country FF Country GG Country HH Country II Country JJ Country KK BigFix Country LL Country MM Country NN11
    • Endpoint security issues by GEO Before TEM After TEM America Americas Europe Europe Asia Asia 2006 2007 2008 2009 2006 2007 2008 2009 2010 2011 1212
    • Endpoint Manager - Mobile Device Management 13
    • BlueMac 14
    • BYODKey elements• Strategi• Policy• Tool 15
    • Ibm.com/mobile-enterprise ibm.com/tivoli/endpointMartin VittrupSenior Technology SpecialistIBM Denmarkvittrup@dk.ibm.com 16
    • Speaker instructions• IBM speakers, IF you make any reference to product/services content that won’t be announced until after your PCTY 2012 event concludes, you must include the disclaimer language (on slide 2 here) verbatim. The disclaimer language must be on the second slide in your presentation and is in addition to the “Acknowledgements, disclaimers and trademarks” page which is to be included in all presentations (slide 7 here).• IBM speakers, you must include the “Acknowledgements, disclaimers and trademarks” page (slide 7 here) at the end of your presentation. IF you are speaking with a customer or Business Partner, you MUST use the disclaimer slide. 17
    • Please note:• IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.• Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision.• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the users job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 18
    • 19
    • Divider Slide
    • 21
    • Acknowledgements, disclaimersand trademarks© Copyright IBM Corporation 2012. All rights reserved.The information contained in this publication is provided for informational purposes only. While efforts were made to verify thecompleteness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express orimplied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM withoutnotice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any othermaterials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representationsfrom IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBMsoftware.References in this publication to IBM products, programs or services do not imply that they will be made available in all countries inwhich IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or featureavailability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that anyactivities undertaken by you will result in any specific sales, revenue growth, savings or other results. All statements regarding IBMfuture direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.Information concerning non-IBM products and services was obtained from a supplier of those products and services. IBM has not testedthese products or services and cannot confirm the accuracy of performance, compatibility, or any other claims related to non-IBMproducts and services. Questions on the capabilities of non-IBM products and services should be addressed to the supplier of thoseproducts and services.All customer examples cited or described are presented as illustrations of the manner in which some customers have used IBM productsand the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer and willvary depending on individual customer configurations and conditions. Nothing contained in these materials is intended to, nor shall havethe effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.Prices are suggested U.S. list prices and are subject to change without notice. Starting price may not include a hard drive, operatingsystem or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.IBM, the IBM logo, ibm.com, Tivoli, the Tivoli logo, Tivoli Enterprise Console, Tivoli Storage Manager FastBack, and other IBM productsand services are trademarks or registered trademarks of International Business Machines Corporation in the United States, othercountries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademarksymbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information waspublished. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks isavailable on the Web at "Copyright and trademark information" at ibm.com/legal/copytrade.shtml 22