SlideShare a Scribd company logo
1 of 4
Download to read offline
1 www.arabbusinessreview.com
Apple and IBM Partnership
 The new IBM-Apple partnership targets the missing gap between popular
Apple mobile divides, BYOD programs and enterprise applications.
 The goal is to combine this into a better solution while offering more
flexibility to the end users, cheaper administration costs and more efficiency
in the daily business operations.
 With cyber security and data privacy on the rise, this article will take a look
on how this partnership will address the needed protection to corporate
knowledge and what we can expect in the near future.
Apple – IBM Partnership and Impact on Security
The much publicized new partnership between Apple and IBM is significant as it positions Apple
to increase its penetration into the enterprise business area. The main focus of this partnership
will address mobility and the increasing BYOD/CYOD that many companies have implemented.
Rolling out a new class of more than 100 industry-specific enterprise solutions including native
apps, developed exclusively from the ground up for iPhone and iPad is the key point in this
partnership. Unique IBM cloud services optimized for iOS, including device management,
2 www.arabbusinessreview.com
security, analytics and mobile integration; new AppleCare® service and support and as well as
offerings from IBM for device activation, supply and management will open up a large market
opportunity for Apple and put IBMs renowned big data analytics at iOS users’ fingertips.
Apple is planning to have iOS become a serious player in the enterprise and with this alliance to
develop an enterprise-friendly range of systems on tablets and smartphones. This will ease
some serious enterprise concerns around how to manage Apple’s iOS systems and addressing
the BYOD issues companies are facing, but how will this address the questions around
integration, functionality and security?
In the US, around 65 per cent of firms allow iOS usage, according to IDC figures and allow
workers access enterprise applications via personally owned devices because of the perceived
productivity benefits. Although 98% of employers have a security policy in place for mobile
access to corporate data, 21% allow employee access with no security at all. Without properly
enforced controls, companies will continue to face serious security challenges.
Chief Information Security Officers’ opinions across various industries have been split over
whether Apple’s consumer-focused iOS operating system, could be secured and integrated
appropriately for business applications and sensitive data and therefore minimizing the risk of
data loss and breach. True enterprise mobile apps need back-end services integration, security
and identity management. In the last IBM CISO Assessment, mobile security was a top concern,
with more than half of interviewed security leaders ranking it as a major technology challenge
that needs to be addressed over the next two years; 76% say the loss of a mobile device with
access to corporate data could result in a significant security event.
3 www.arabbusinessreview.com
IBM MobileFirst Platform for iOS is planned to address some of these issues by providing the
services required for an end-to-end enterprise capability. This will not only include analytics,
workflow and cloud storage, but also security and integration while making use of IBM’s unique
Bluemix Platform as a Service (PaaS) offering.
Bluemix mobile zone for iOS will enable developers that work with Xcode and inside the iOS
environment to benefit from Internet cloud storage, workflows, analytics and many other
capabilities, giving them easy ways to plug into SDKs and APIs and take advantage of existing
offerings on Bluemix. This alone should contribute to the roll out and implementation of new
apps which will address the increasing need for data security and privacy. Although it will not
allow the same collaboration and flexibility as in an open source environment, it will allow easy
integration of new apps into already existing security features IBM is currently offering such as
Security Access Manager (a context based authorization) or its mobile web app and web
elements vulnerability scanning. New security features will include complex device
fingerprinting of mobile devices, protection against financial account take overs, compromised
mobile device detection and a global fraudster database.
The new class of “made-for-business apps” which Apple and IBM are working on now, will
target industries such as healthcare, banking, telecommunication and insurance and will be
made available fall 2015. Considering that Trend Micro estimates that 1 in 10 Android apps are
malware with the number of mobile apps nearly quadrupled between 2011 and 2013, the
Apple-IBM team can certainly build on the relatively low apple app infection rate plus their
developed apps with the enterprise touch for end point protection and security.
The corporate world will get the best out of this partnership. Using IPads with IBM software,
and central management will make it easier for companies to go mobile as well as manage
these devices and provide the adequate protection needed. Deploying and managing Apple
4 www.arabbusinessreview.com
devices in volumes should have cost reductions over conventional PCs given the industrial-
strength AppleCare that will be in place.
Considering the constantly increasing BYOD programs and many employees using their own
Apple products – although with limited enterprise connections and tools – consumers might
benefit from this partnership as well. BYOD programs with Apple products should get better, be
better supported by corporate IT departments and cause less headaches for CIOs on how to
secure corporate data on the on the so popular but not really enterprises compatible hardware.
The article is written by Dasha Deckwerth for Arab Business Review
To read more thought-leadership stuff by leaders from Arab Region, please visit Arab Business Review

More Related Content

What's hot

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...Skyhigh Networks
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseSkyhigh Networks
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015Skyhigh Networks
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...Richard Edwards
 
Global technology outlook_2013
Global technology outlook_2013Global technology outlook_2013
Global technology outlook_2013IBM Software India
 
IBM Research - Technology Outlook 2013
IBM Research - Technology Outlook 2013IBM Research - Technology Outlook 2013
IBM Research - Technology Outlook 2013IBM_CH
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applicationsvlink india
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesPavan Kumar
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 

What's hot (20)

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
 
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the EnterpriseThe Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
The Quiet Revolution: 12 Must-Know Statistics on Cloud Usage in the Enterprise
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...
Ovum Trends to Watch 2014: Enterprise Collaboration and The Workplace of the ...
 
Global technology outlook_2013
Global technology outlook_2013Global technology outlook_2013
Global technology outlook_2013
 
IBM Research - Technology Outlook 2013
IBM Research - Technology Outlook 2013IBM Research - Technology Outlook 2013
IBM Research - Technology Outlook 2013
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applications
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 

Similar to Apple and ibm partnership

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesFuGenx Technologies
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT SolutionsDMIMarketing
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014Enterprise Mobile
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Cygnet Infotech
 

Similar to Apple and ibm partnership (20)

Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Security that works
Security that worksSecurity that works
Security that works
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Io t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challengesIo t and mobile app integration impact, benefits, and challenges
Io t and mobile app integration impact, benefits, and challenges
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Game Changing IT Solutions
Game Changing IT SolutionsGame Changing IT Solutions
Game Changing IT Solutions
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 

More from team-abr

Can investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryCan investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryteam-abr
 
Higher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemHigher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemteam-abr
 
Time of the machines
Time of the machinesTime of the machines
Time of the machinesteam-abr
 
Addressing pilot shortage
Addressing pilot shortageAddressing pilot shortage
Addressing pilot shortageteam-abr
 
How to run an effective linked in campaign
How to run an effective linked in campaignHow to run an effective linked in campaign
How to run an effective linked in campaignteam-abr
 
Unemployment paradox in the mena region
Unemployment paradox in the mena regionUnemployment paradox in the mena region
Unemployment paradox in the mena regionteam-abr
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle eastteam-abr
 
Mall medicine
Mall medicineMall medicine
Mall medicineteam-abr
 
Health tourism in the uae
Health tourism in the uaeHealth tourism in the uae
Health tourism in the uaeteam-abr
 
Hospitality & luxury
Hospitality & luxuryHospitality & luxury
Hospitality & luxuryteam-abr
 
Uae – innovating to grow & diversify
Uae – innovating to grow & diversifyUae – innovating to grow & diversify
Uae – innovating to grow & diversifyteam-abr
 
10 time management techniques
10 time management techniques10 time management techniques
10 time management techniquesteam-abr
 
We can do it as arabs
We can do it as arabsWe can do it as arabs
We can do it as arabsteam-abr
 
Arab public administration
Arab public administrationArab public administration
Arab public administrationteam-abr
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divideteam-abr
 
Workplace wellness an investment well worth it
Workplace wellness an investment well worth itWorkplace wellness an investment well worth it
Workplace wellness an investment well worth itteam-abr
 
Social and emotional learning
Social and emotional learningSocial and emotional learning
Social and emotional learningteam-abr
 
The nomadic patient
The nomadic patientThe nomadic patient
The nomadic patientteam-abr
 
Being an entrepreneur in the gulf
Being an entrepreneur in the gulfBeing an entrepreneur in the gulf
Being an entrepreneur in the gulfteam-abr
 
Hashtag abuse
Hashtag abuseHashtag abuse
Hashtag abuseteam-abr
 

More from team-abr (20)

Can investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recoveryCan investors bet on a broad emerging markets recovery
Can investors bet on a broad emerging markets recovery
 
Higher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystemHigher education system – the weakest link of mena's entrepreneurial ecosystem
Higher education system – the weakest link of mena's entrepreneurial ecosystem
 
Time of the machines
Time of the machinesTime of the machines
Time of the machines
 
Addressing pilot shortage
Addressing pilot shortageAddressing pilot shortage
Addressing pilot shortage
 
How to run an effective linked in campaign
How to run an effective linked in campaignHow to run an effective linked in campaign
How to run an effective linked in campaign
 
Unemployment paradox in the mena region
Unemployment paradox in the mena regionUnemployment paradox in the mena region
Unemployment paradox in the mena region
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
Mall medicine
Mall medicineMall medicine
Mall medicine
 
Health tourism in the uae
Health tourism in the uaeHealth tourism in the uae
Health tourism in the uae
 
Hospitality & luxury
Hospitality & luxuryHospitality & luxury
Hospitality & luxury
 
Uae – innovating to grow & diversify
Uae – innovating to grow & diversifyUae – innovating to grow & diversify
Uae – innovating to grow & diversify
 
10 time management techniques
10 time management techniques10 time management techniques
10 time management techniques
 
We can do it as arabs
We can do it as arabsWe can do it as arabs
We can do it as arabs
 
Arab public administration
Arab public administrationArab public administration
Arab public administration
 
The arab digital divide
The arab digital divideThe arab digital divide
The arab digital divide
 
Workplace wellness an investment well worth it
Workplace wellness an investment well worth itWorkplace wellness an investment well worth it
Workplace wellness an investment well worth it
 
Social and emotional learning
Social and emotional learningSocial and emotional learning
Social and emotional learning
 
The nomadic patient
The nomadic patientThe nomadic patient
The nomadic patient
 
Being an entrepreneur in the gulf
Being an entrepreneur in the gulfBeing an entrepreneur in the gulf
Being an entrepreneur in the gulf
 
Hashtag abuse
Hashtag abuseHashtag abuse
Hashtag abuse
 

Apple and ibm partnership

  • 1. 1 www.arabbusinessreview.com Apple and IBM Partnership  The new IBM-Apple partnership targets the missing gap between popular Apple mobile divides, BYOD programs and enterprise applications.  The goal is to combine this into a better solution while offering more flexibility to the end users, cheaper administration costs and more efficiency in the daily business operations.  With cyber security and data privacy on the rise, this article will take a look on how this partnership will address the needed protection to corporate knowledge and what we can expect in the near future. Apple – IBM Partnership and Impact on Security The much publicized new partnership between Apple and IBM is significant as it positions Apple to increase its penetration into the enterprise business area. The main focus of this partnership will address mobility and the increasing BYOD/CYOD that many companies have implemented. Rolling out a new class of more than 100 industry-specific enterprise solutions including native apps, developed exclusively from the ground up for iPhone and iPad is the key point in this partnership. Unique IBM cloud services optimized for iOS, including device management,
  • 2. 2 www.arabbusinessreview.com security, analytics and mobile integration; new AppleCare® service and support and as well as offerings from IBM for device activation, supply and management will open up a large market opportunity for Apple and put IBMs renowned big data analytics at iOS users’ fingertips. Apple is planning to have iOS become a serious player in the enterprise and with this alliance to develop an enterprise-friendly range of systems on tablets and smartphones. This will ease some serious enterprise concerns around how to manage Apple’s iOS systems and addressing the BYOD issues companies are facing, but how will this address the questions around integration, functionality and security? In the US, around 65 per cent of firms allow iOS usage, according to IDC figures and allow workers access enterprise applications via personally owned devices because of the perceived productivity benefits. Although 98% of employers have a security policy in place for mobile access to corporate data, 21% allow employee access with no security at all. Without properly enforced controls, companies will continue to face serious security challenges. Chief Information Security Officers’ opinions across various industries have been split over whether Apple’s consumer-focused iOS operating system, could be secured and integrated appropriately for business applications and sensitive data and therefore minimizing the risk of data loss and breach. True enterprise mobile apps need back-end services integration, security and identity management. In the last IBM CISO Assessment, mobile security was a top concern, with more than half of interviewed security leaders ranking it as a major technology challenge that needs to be addressed over the next two years; 76% say the loss of a mobile device with access to corporate data could result in a significant security event.
  • 3. 3 www.arabbusinessreview.com IBM MobileFirst Platform for iOS is planned to address some of these issues by providing the services required for an end-to-end enterprise capability. This will not only include analytics, workflow and cloud storage, but also security and integration while making use of IBM’s unique Bluemix Platform as a Service (PaaS) offering. Bluemix mobile zone for iOS will enable developers that work with Xcode and inside the iOS environment to benefit from Internet cloud storage, workflows, analytics and many other capabilities, giving them easy ways to plug into SDKs and APIs and take advantage of existing offerings on Bluemix. This alone should contribute to the roll out and implementation of new apps which will address the increasing need for data security and privacy. Although it will not allow the same collaboration and flexibility as in an open source environment, it will allow easy integration of new apps into already existing security features IBM is currently offering such as Security Access Manager (a context based authorization) or its mobile web app and web elements vulnerability scanning. New security features will include complex device fingerprinting of mobile devices, protection against financial account take overs, compromised mobile device detection and a global fraudster database. The new class of “made-for-business apps” which Apple and IBM are working on now, will target industries such as healthcare, banking, telecommunication and insurance and will be made available fall 2015. Considering that Trend Micro estimates that 1 in 10 Android apps are malware with the number of mobile apps nearly quadrupled between 2011 and 2013, the Apple-IBM team can certainly build on the relatively low apple app infection rate plus their developed apps with the enterprise touch for end point protection and security. The corporate world will get the best out of this partnership. Using IPads with IBM software, and central management will make it easier for companies to go mobile as well as manage these devices and provide the adequate protection needed. Deploying and managing Apple
  • 4. 4 www.arabbusinessreview.com devices in volumes should have cost reductions over conventional PCs given the industrial- strength AppleCare that will be in place. Considering the constantly increasing BYOD programs and many employees using their own Apple products – although with limited enterprise connections and tools – consumers might benefit from this partnership as well. BYOD programs with Apple products should get better, be better supported by corporate IT departments and cause less headaches for CIOs on how to secure corporate data on the on the so popular but not really enterprises compatible hardware. The article is written by Dasha Deckwerth for Arab Business Review To read more thought-leadership stuff by leaders from Arab Region, please visit Arab Business Review