• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
IBM Connect 2013: BYOD at IBM

IBM Connect 2013: BYOD at IBM



ID505 BYOD at IBM - IBM Lotus Notes Traveler, IBM Connections Mobile, IBM Endpoint Manager and More!

ID505 BYOD at IBM - IBM Lotus Notes Traveler, IBM Connections Mobile, IBM Endpoint Manager and More!



Total Views
Views on SlideShare
Embed Views



17 Embeds 1,186

http://www.chrispepin.com 712
http://www.idonotes.com 181
http://synergie-informatique.blogspot.fr 180
http://planetlotus.org 26
http://12946563_b493193dfd313afb18195bffa97a1e0bacee92e7.blogspot.com 22
http://eventifier.co 14
http://feeds.feedburner.com 12
http://synergie-informatique.blogspot.com 10
https://twitter.com 9
http://www.scoop.it 6
http://www.paperblog.fr 4
http://list.ly 3
http://www.ibm.com 2
http://abtasty.com 2
http://www.diffbot.com&_=1359927879775 HTTP 1
http://synergie-informatique.blogspot.ro 1
http://www.blogger.com 1



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    IBM Connect 2013: BYOD at IBM IBM Connect 2013: BYOD at IBM Presentation Transcript

    • ID505 BYOD at IBM - IBM Lotus Notes Traveler, IBM Connections Mobile, IBM Endpoint Manager and More! Chris Pepin | IBM Mobile Technology Evangelist© 2013 IBM Corporation
    • You are encouraged to use your mobiledevice during this presentation #IBMConnect #IBMConnectID5052
    • Objectives Share the IBM internal story on becoming a mobile enterprise What worked…what didn’t The next steps on IBM’s mobile enterprise journey Engaging IBM to assist with your mobile deployment3
    • IBM 435,000 employees worldwide 50% of employees are mobile 120,000 employees using smartphones and tablets; 80,000 are BYOD4
    • BYOD = Bring Your Own Device The use of personally-owned devices such as smartphone, tablets and laptops for business purposes IBMs BYOD program "really is about supporting employees in the way they want to work. They will find the most appropriate tool to Impossible to stop BYOD – employees get their job done. I want to make sure I can enable them will “find a way” to do that, but in a way that safeguards the integrity of our business.“ - IBM CIO Jeanette Horan BYOD isn’t new at IBM – expanding mobile services is5
    • How IBM became a mobile enterprise Strategy Education Policy Technology
    • The mobile enterprise starts with defining a strategy Business problem Personas and use cases Strategy Mobile applications
    • IBM’s mobile strategy Embrace smartphones, tablets & BYOD Increase employee flexibility, productivity and satisfaction Strategy Security is a key requirement: trust but verify
    • Written corporate mobile policy is essential Terms and conditions Corporate owned devices & BYOD Policy Collaborative effort by information technology, security, human resources, legal, procurement and reimbursement
    • IBM’s mobile policy Single policy for PCs, smartphones and tablets published on IBM’s intranet Addresses corporate-owned as well as BYOD (opt-in) Policy Collaborative effort by information technology, security, human resources, legal, procurement and reimbursement
    • Technology implements and enforces corporate policy Endpoint management Data & application management Network access Technology Anti-malware Authentication
    • Mobile technology in use inside IBM BlackBerry Enterprise Server IBM Lotus Notes Traveler IBM Endpoint Manager IBM Sametime Mobile IBM Connections Mobile Technology IBM Worklight IBM Mobile Connect
    • IBM Lotus Notes Traveler Two way-synchronization of email, contacts and calendar Support for Apple iOS, Google Android, Windows Mobile and Symbian. Windows Phone support coming 1Q2013
    • IBM Endpoint Manager Mobile Device Management (MDM) for smartphones, tablets, PCs and servers Compliments IBM Traveler with advanced management including jailbreak detection, anti-malware compliance and compliance with corporate security policy
    • IBM Lotus Notes Traveler and IBM Endpoint Manager arecomplimentary15
    • IBM Sametime and IBM Connections Instant messaging Social business Moving beyond e-mail
    • IBM Worklight Develop custom native, web, HTLM5 and hybrid applications Support for multiple platforms including Apple iOS, Android, BlackBerry and Windows Phone Components include studio, server, runtime, console and app center
    • IBM Mobile Connect Secure Virtual Private Network solution Connects smartphones and tablets on the public Internet securely with corporate network (e.g. Traveler, Sametime, Connections) Invisible to end users: superior end- user experience
    • Employees are the weakest security link and education isessential Identifying cybersecurity threats Protecting corporate and client data Safeguarding devices Education Data and security incident reporting Build a “culture of security”
    • IBM Mobile Education Business Conduct Guidelines Digital IBMer secure computing online education Education IT Help Central Social sharing via IBM Connections Technology Adoption Program (TAP)
    • The next steps of IBM’s mobile journey Increasing infrastructure capacity to support more mobile devices More mobile applications Network access control and corporate wi-fi enhancements Containerization21
    • Lessons learned Don’t try to boil the ocean – walk before you run Open and frank communication with employees The mobile enterprise continues to evolve – be flexible and embrace change Reach out for help from mobile experts - IBM CIO partnered with IBM Global Technology Services22
    • IBM offers products and services to address the completemobile lifecycle Connect to backend Build mobile systems applications Assess and Plan Manage mobile devices enterprise mobile and applications strategy Secure your mobile business Transform the business by creating Extend existing business new opportunities capabilities to mobile devices23
    • By engaging a services provider, leading businessesaccelerate value from mobile2/3of chief information officers Free IT staff to focus on other business-critical initiatives(CIOs) plan to partnerextensively to gain new Leverage additional skill setsskills and expertise as needed20% Gain in-depth expertise of methodologies and toolsproductivity gains and costsavings experienced by Have wider range of mobileCIOs who have outsourced activities underwaykey mobile servicesSource: The New Workplace CIO Study, IBM Market Insights, October 2011
    • Many IBM clients have already experienced the benefits of aholistic approach to a mobile-enabled enterprise Consolidating a ruggedized Banking on BYOD: mobile device strategy to leveraging secured mobility streamline logistics and services to improve reduced operating costs enterprise application access Transportation Banking North American freight firm European bank implemented improved product delivery, a BYOD program for inventory management and smartphone and tablet logistics support while access to corporate email, cutting costs with ruggedized contacts, calendar, intranet mobile devices. and applications25
    • For more informationIBM mobile enterpriseibm.com/mobile-enterpriseIBM mobile servicesibm.com/services/mobilityIBM mobile softwareibm.com/software/solutions/mobile-enterprise/YouTube videosyoutube.com/ibmmobileenterprise @IBMMobile26
    • For more information – continuedIBM CIO video, whitepaper presentationchrispepin.com/2012/11/how-ibm-became-mobile-enterprise.htmlAn integrated approach to managing and securing your mobile environmentpublic.dhe.ibm.com/common/ssi/ecm/en/tis14115usen/TIS14115USEN.PDFIBM mobile frontier blogibm.com/developerworks/mydeveloperworks/blogs/mobileblog @ChrisPepin27
    • Legal disclaimer © IBM Corporation 2013. All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.28 © 2013 IBM Corporation