SlideShare a Scribd company logo
1 of 25
Download to read offline
1© 2015 IBM Corporation© 2015 IBM Corporation
with Ovum Research and IBM
2015 Mobile Security Wrap-up
and 2016 Look Ahead
Richard Absalom, Principal Analyst, Enterprise Mobility
Jonathan Dale, IBM Security
December 9, 2015
2© 2015 IBM Corporation
Housekeeping items
✓Duration – 60 minutes
✓Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
✓Recording and slides will be
emailed to you
3© 2015 IBM Corporation
Agenda
2015 Year in Review
2016 Trends to Watch
IBM Security Overview
Q&A
4© Copyright Ovum 2014. All rights reserved.
About Ovum
• Leading independent global IT & Telecoms Research & Analysis firm
• 180 analysts covering a broad set of technologies and markets
• Provides strategic advice to telecoms operators, IT vendors, service providers,
and enterprise IT leaders
• Headquartered in London (UK)
• 4 year history of investment in understanding consumerization behaviors,
enterprise mobility and productivity
5© Copyright Ovum 2014. All rights reserved.
2015: Year in Review
6© Copyright Ovum 2014. All rights reserved.
What we said this time last year: There is a clear
mismatch between employer knowledge and
employee behavior around mobility
65.6%
40.3%
54.7%
26.0%
16.8% 17.4%
0%
10%
20%
30%
40%
50%
60%
70%
Smartphone Tablet Laptop
%ofrespondents
Do you use your personal devices for work? (employees) vs. What
percentage of your employees use their own devices for work?
(enterprise IT)
Employee responses Enterprise IT responses
Source: Ovum Employee Mobility Survey 2014 (N=5,187), Ovum ICT Enterprise Insights Survey 2014 (N=2,708)
7© Copyright Ovum 2014. All rights reserved.
End of 2015: the mismatch is still there
Source: Ovum Employee Mobility Survey 2015
27.5% 28.3% 24.4%
41.1%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
People who BYO
smartphone
People who BYO tablet People who BYO
laptop
People who BYO
wearable
%ofrespondentswhousetheirowndevices
Have you signed a policy governing the use of your personal device(s) for
work?
Yes
No
Don't know
8© Copyright Ovum 2014. All rights reserved.
28.7% of employees who use their own smartphone
for work are still doing so directly against stated
corporate policy
Source: Ovum Employee Mobility Survey 2015, N=2,123
Not allowed to use
device
3.5%
COBO
13.1%
CYOD / COPE
12.1%
Unlimited, unsupported
BYOD
22.6%
Limited,
supported
BYOD
10.5%
Unlimited, supported
BYOD
38.2%
Among those who BYOS, how does their employer provide smartphones?
9© Copyright Ovum 2014. All rights reserved.
Enterprise views on mobility are becoming more app
and task-focused – we’ve been talking about the need
for both “Hero” and “Soldier” apps
10© Copyright Ovum 2014. All rights reserved.
The virtuous circle of mobile enterprise app
development and deployment
11© Copyright Ovum 2014. All rights reserved.
Businesses are gradually moving along the mobility
maturity model, towards viewing mobility as potentially
transformational
React
Identify internal demand
for mobility – often driven
by BYOD
Adopt
Trial a solution / service
to manage the influx of
devices – often MDM
Build
Build on the original
solution to provide a
wider range of capabilities
to end users, including
“Hero” apps
Transform
Transform business
processes by providing
process-specific
“Soldier” apps
12© Copyright Ovum 2014. All rights reserved.
There is some evidence that enterprise app stores are
taking off – but there is still a way to go
Source: Ovum Employee Mobility Survey 2015, N=4,267
Yes
25.8%
No
65.9%
Don’t
know
8.2%
Does your employer provide access to mobile apps that you can use for
work through a corporate app store or portal?
13© Copyright Ovum 2014. All rights reserved.
The march towards the digital workspace continues
apace
 Businesses and employees are embracing the idea that work is something we
do, not somewhere we go
 We are getting increasing numbers of enquiries about the need for cross
platform IT management and security
 The digital workspace is about providing any time access to any application,
on any device: the natural evolution of enterprise mobility management
14© Copyright Ovum 2014. All rights reserved.
The march towards the digital workspace continues
apace
 Mobility management is now about much more than MDM:
 Cross platform application development, provision and management – across
PC and mobile
 Identity and access management to underpin security across devices
 Content management and file-level security
15© Copyright Ovum 2014. All rights reserved.
Competitive Enterprise Mobility Management review:
2015 was a year of shakeout and consolidation in the
market
 Smaller vendors have dropped out, changed focus or been acquired
 The major players are now nearly all IT Megavendors, including new joiners in
2015
 These larger vendors can do more than just mobility management and are
playing more and more on the idea of the digital workspace
16© Copyright Ovum 2014. All rights reserved.
2016: New Trends to Watch
17© Copyright Ovum 2014. All rights reserved.
The beginning of the rise of wearables: smart watches
and BYOD
But that’s actually around 47% of employees
who actually own a wearable
So, as with smartphones and tablets
previously, BYOD is likely to be the primary
initial route for smart watches into the
enterprise – but they need a killer app!
7.7% of employees are using their own
wearable device such as a smart watch for
work – much lower than smartphones or
tablets…
Source: Ovum Employee Mobility Survey 2015, N=4,502
18© Copyright Ovum 2014. All rights reserved.
The beginning of the rise of wearables: HUDs to find
their workplace niche
HUDs such as Google Glass haven’t really
taken off in the consumer space…
But they are pretty cool for certain functions at work
19© Copyright Ovum 2014. All rights reserved.
Mobile carriers and software vendors aim to fulfil
demand for split billing
 The need for split billing is being driven both by user behavior and legal
rulings
 Businesses want to find ways to efficiently reimburse BYOD costs (monthly
stipends aren’t always the best way of doing this), or separate work and
personal activity on corporate-owned devices
 Legal ruling in California expected to be replicated elsewhere – watch this
space
20© Copyright Ovum 2014. All rights reserved.
Security is a key issue for enterprise IT decision
makers, and intrinsically linked to all other trends
 Ovum’s large scale Decision Maker survey identifies security, identity as #2 of
8 IT priorities: 55.8% list it as one of top priorities
 Because mobile devices do so much more than email now, mobile security is
impossible to ignore
 Security is being built into strategic thinking around mobility – perhaps the
time taken to wrestle with finding the right solution is behind the finding that so
much mobile activity still goes unmanaged?
21 © 2015 IBM Corporation
IBM Security Overview
© 2015 IBM Corporation
IBM Security
22
The IBM mobile security framework
CA, Oracle, RSA
Configure devices &
manage security policies
Automate enforcement
Mitigate risks of lost or
compromised devices
Distribute & manage
enterprise apps
Separate work &
personal data
Protect apps & data
from vulnerabilities
Enable work content
availability & sharing
Create & edit content
Contain sensitive
corporate information
Provide secure web &
mobile access control
Deliver ease-of-use with
SSO & unified identity
management
Extend Security Intelligence
Extend security information & event management (SIEM) to mobile environment
Incorporate log management, anomaly detection, configuration & vulnerability management
Manage Access
and Fraud
Secure Content
and Collaboration
Safeguard
Applications and Data
Protect
Devices
© 2015 IBM Corporation
IBM Security
23
Complete mobility management and security
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
© 2015 IBM Corporation
IBM Security
24
Why IBM MobileFirst Protect?
Integrated
solutions that connect
seamlessly to your
existing and external
environments
Scalable
data security with
intelligence for the
volume, speed, and
variability of mobile
Complete
management of
devices, apps, content
and users from a
single platform
© 2015 IBM Corporation
IBM Security
25
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use
or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily
involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT
THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

More Related Content

What's hot

Enterprise mobility services
Enterprise mobility servicesEnterprise mobility services
Enterprise mobility servicesNet Solutions
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...VDC Research Group
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveSoftweb Solutions
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAGILLY
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategyAjit Gokhale
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDMWSO2
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Five Ways to Improve Your Mobile Testing
Five Ways to Improve Your Mobile TestingFive Ways to Improve Your Mobile Testing
Five Ways to Improve Your Mobile TestingTechWell
 
Executing Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales ForceExecuting Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales Forceaktana
 
Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015FSJU AUJF
 

What's hot (19)

Enterprise mobility services
Enterprise mobility servicesEnterprise mobility services
Enterprise mobility services
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Enterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the moveEnterprise Mobility Solutions: Enterprise operations on the move
Enterprise Mobility Solutions: Enterprise operations on the move
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategy
 
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDMWSO2Con EU 2016: Enterprise Mobility Management:  Moving Beyond Traditional MDM
WSO2Con EU 2016: Enterprise Mobility Management: Moving Beyond Traditional MDM
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Five Ways to Improve Your Mobile Testing
Five Ways to Improve Your Mobile TestingFive Ways to Improve Your Mobile Testing
Five Ways to Improve Your Mobile Testing
 
Executing Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales ForceExecuting Complex Strategies through a Field Sales Force
Executing Complex Strategies through a Field Sales Force
 
Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015Israel redefining innovation at International CES 2015
Israel redefining innovation at International CES 2015
 

Viewers also liked

Australian Verified Business Information Brochure
Australian Verified Business Information BrochureAustralian Verified Business Information Brochure
Australian Verified Business Information Brochureaustralianverifiedbusiness
 
New base energy news issue 862 dated 31 may 2016
New base energy news issue  862 dated 31 may 2016New base energy news issue  862 dated 31 may 2016
New base energy news issue 862 dated 31 may 2016Khaled Al Awadi
 
Practical Aspects of State Machine Replication Virtualization
Practical Aspects of State Machine Replication VirtualizationPractical Aspects of State Machine Replication Virtualization
Practical Aspects of State Machine Replication VirtualizationEUBrasilCloudFORUM .
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignMentor Graphics
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protectAGILLY
 
Introduction in Agriculture
Introduction in AgricultureIntroduction in Agriculture
Introduction in AgricultureMay Ladia
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
Actividades para imprimir: Ejemplo Tercer Grado de Primaria
Actividades para imprimir: Ejemplo Tercer Grado de PrimariaActividades para imprimir: Ejemplo Tercer Grado de Primaria
Actividades para imprimir: Ejemplo Tercer Grado de PrimariaEditorial MD
 
Actividades para imprimir: Ejemplo segundo grado de Primaria
Actividades para imprimir: Ejemplo segundo grado de Primaria Actividades para imprimir: Ejemplo segundo grado de Primaria
Actividades para imprimir: Ejemplo segundo grado de Primaria Editorial MD
 

Viewers also liked (11)

Australian Verified Business Information Brochure
Australian Verified Business Information BrochureAustralian Verified Business Information Brochure
Australian Verified Business Information Brochure
 
New base energy news issue 862 dated 31 may 2016
New base energy news issue  862 dated 31 may 2016New base energy news issue  862 dated 31 may 2016
New base energy news issue 862 dated 31 may 2016
 
Practical Aspects of State Machine Replication Virtualization
Practical Aspects of State Machine Replication VirtualizationPractical Aspects of State Machine Replication Virtualization
Practical Aspects of State Machine Replication Virtualization
 
Addressing the Challenges of IoT Design
Addressing the Challenges of IoT DesignAddressing the Challenges of IoT Design
Addressing the Challenges of IoT Design
 
EU Code Week 2016
EU Code Week 2016EU Code Week 2016
EU Code Week 2016
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
 
Introduction in Agriculture
Introduction in AgricultureIntroduction in Agriculture
Introduction in Agriculture
 
Job or work ni2
Job or work ni2Job or work ni2
Job or work ni2
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
Actividades para imprimir: Ejemplo Tercer Grado de Primaria
Actividades para imprimir: Ejemplo Tercer Grado de PrimariaActividades para imprimir: Ejemplo Tercer Grado de Primaria
Actividades para imprimir: Ejemplo Tercer Grado de Primaria
 
Actividades para imprimir: Ejemplo segundo grado de Primaria
Actividades para imprimir: Ejemplo segundo grado de Primaria Actividades para imprimir: Ejemplo segundo grado de Primaria
Actividades para imprimir: Ejemplo segundo grado de Primaria
 

Similar to Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise Daryl Pereira
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcNitin Gaur
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand Nitin Gaur
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomyDATAVERSITY
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 MistakesMobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakesyonster
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechUBM (Technology)
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Building intelligent APIs - Andy Thurai, IBM
Building intelligent APIs - Andy Thurai, IBMBuilding intelligent APIs - Andy Thurai, IBM
Building intelligent APIs - Andy Thurai, IBMPAPIs.io
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Location sensing and IBM presence insights
Location sensing and IBM presence insightsLocation sensing and IBM presence insights
Location sensing and IBM presence insightsDerek Baron
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseEd Brill
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...poore120
 

Similar to Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016 (20)

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dc
 
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
IBM MobileFirst: Defining a Digital StrategyCommunicating to UnderstandIBM MobileFirst: Defining a Digital StrategyCommunicating to Understand
IBM MobileFirst: Defining a Digital Strategy Communicating to Understand
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App Economy
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 MistakesMobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Building intelligent APIs - Andy Thurai, IBM
Building intelligent APIs - Andy Thurai, IBMBuilding intelligent APIs - Andy Thurai, IBM
Building intelligent APIs - Andy Thurai, IBM
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Location sensing and IBM presence insights
Location sensing and IBM presence insightsLocation sensing and IBM presence insights
Location sensing and IBM presence insights
 
Build a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile EnterpriseBuild a MobileFirst Agenda - IBM Mobile Enterprise
Build a MobileFirst Agenda - IBM Mobile Enterprise
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
 

More from AGILLY

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...AGILLY
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfAGILLY
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloudAGILLY
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAGILLY
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile frAGILLY
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief frAGILLY
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationAGILLY
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?AGILLY
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017AGILLY
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesAGILLY
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueAGILLY
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix OverviewAGILLY
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : ProtectAGILLY
 

More from AGILLY (20)

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 

Recently uploaded

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durbanmasabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

Recently uploaded (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016

  • 1. 1© 2015 IBM Corporation© 2015 IBM Corporation with Ovum Research and IBM 2015 Mobile Security Wrap-up and 2016 Look Ahead Richard Absalom, Principal Analyst, Enterprise Mobility Jonathan Dale, IBM Security December 9, 2015
  • 2. 2© 2015 IBM Corporation Housekeeping items ✓Duration – 60 minutes ✓Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen ✓Recording and slides will be emailed to you
  • 3. 3© 2015 IBM Corporation Agenda 2015 Year in Review 2016 Trends to Watch IBM Security Overview Q&A
  • 4. 4© Copyright Ovum 2014. All rights reserved. About Ovum • Leading independent global IT & Telecoms Research & Analysis firm • 180 analysts covering a broad set of technologies and markets • Provides strategic advice to telecoms operators, IT vendors, service providers, and enterprise IT leaders • Headquartered in London (UK) • 4 year history of investment in understanding consumerization behaviors, enterprise mobility and productivity
  • 5. 5© Copyright Ovum 2014. All rights reserved. 2015: Year in Review
  • 6. 6© Copyright Ovum 2014. All rights reserved. What we said this time last year: There is a clear mismatch between employer knowledge and employee behavior around mobility 65.6% 40.3% 54.7% 26.0% 16.8% 17.4% 0% 10% 20% 30% 40% 50% 60% 70% Smartphone Tablet Laptop %ofrespondents Do you use your personal devices for work? (employees) vs. What percentage of your employees use their own devices for work? (enterprise IT) Employee responses Enterprise IT responses Source: Ovum Employee Mobility Survey 2014 (N=5,187), Ovum ICT Enterprise Insights Survey 2014 (N=2,708)
  • 7. 7© Copyright Ovum 2014. All rights reserved. End of 2015: the mismatch is still there Source: Ovum Employee Mobility Survey 2015 27.5% 28.3% 24.4% 41.1% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% People who BYO smartphone People who BYO tablet People who BYO laptop People who BYO wearable %ofrespondentswhousetheirowndevices Have you signed a policy governing the use of your personal device(s) for work? Yes No Don't know
  • 8. 8© Copyright Ovum 2014. All rights reserved. 28.7% of employees who use their own smartphone for work are still doing so directly against stated corporate policy Source: Ovum Employee Mobility Survey 2015, N=2,123 Not allowed to use device 3.5% COBO 13.1% CYOD / COPE 12.1% Unlimited, unsupported BYOD 22.6% Limited, supported BYOD 10.5% Unlimited, supported BYOD 38.2% Among those who BYOS, how does their employer provide smartphones?
  • 9. 9© Copyright Ovum 2014. All rights reserved. Enterprise views on mobility are becoming more app and task-focused – we’ve been talking about the need for both “Hero” and “Soldier” apps
  • 10. 10© Copyright Ovum 2014. All rights reserved. The virtuous circle of mobile enterprise app development and deployment
  • 11. 11© Copyright Ovum 2014. All rights reserved. Businesses are gradually moving along the mobility maturity model, towards viewing mobility as potentially transformational React Identify internal demand for mobility – often driven by BYOD Adopt Trial a solution / service to manage the influx of devices – often MDM Build Build on the original solution to provide a wider range of capabilities to end users, including “Hero” apps Transform Transform business processes by providing process-specific “Soldier” apps
  • 12. 12© Copyright Ovum 2014. All rights reserved. There is some evidence that enterprise app stores are taking off – but there is still a way to go Source: Ovum Employee Mobility Survey 2015, N=4,267 Yes 25.8% No 65.9% Don’t know 8.2% Does your employer provide access to mobile apps that you can use for work through a corporate app store or portal?
  • 13. 13© Copyright Ovum 2014. All rights reserved. The march towards the digital workspace continues apace  Businesses and employees are embracing the idea that work is something we do, not somewhere we go  We are getting increasing numbers of enquiries about the need for cross platform IT management and security  The digital workspace is about providing any time access to any application, on any device: the natural evolution of enterprise mobility management
  • 14. 14© Copyright Ovum 2014. All rights reserved. The march towards the digital workspace continues apace  Mobility management is now about much more than MDM:  Cross platform application development, provision and management – across PC and mobile  Identity and access management to underpin security across devices  Content management and file-level security
  • 15. 15© Copyright Ovum 2014. All rights reserved. Competitive Enterprise Mobility Management review: 2015 was a year of shakeout and consolidation in the market  Smaller vendors have dropped out, changed focus or been acquired  The major players are now nearly all IT Megavendors, including new joiners in 2015  These larger vendors can do more than just mobility management and are playing more and more on the idea of the digital workspace
  • 16. 16© Copyright Ovum 2014. All rights reserved. 2016: New Trends to Watch
  • 17. 17© Copyright Ovum 2014. All rights reserved. The beginning of the rise of wearables: smart watches and BYOD But that’s actually around 47% of employees who actually own a wearable So, as with smartphones and tablets previously, BYOD is likely to be the primary initial route for smart watches into the enterprise – but they need a killer app! 7.7% of employees are using their own wearable device such as a smart watch for work – much lower than smartphones or tablets… Source: Ovum Employee Mobility Survey 2015, N=4,502
  • 18. 18© Copyright Ovum 2014. All rights reserved. The beginning of the rise of wearables: HUDs to find their workplace niche HUDs such as Google Glass haven’t really taken off in the consumer space… But they are pretty cool for certain functions at work
  • 19. 19© Copyright Ovum 2014. All rights reserved. Mobile carriers and software vendors aim to fulfil demand for split billing  The need for split billing is being driven both by user behavior and legal rulings  Businesses want to find ways to efficiently reimburse BYOD costs (monthly stipends aren’t always the best way of doing this), or separate work and personal activity on corporate-owned devices  Legal ruling in California expected to be replicated elsewhere – watch this space
  • 20. 20© Copyright Ovum 2014. All rights reserved. Security is a key issue for enterprise IT decision makers, and intrinsically linked to all other trends  Ovum’s large scale Decision Maker survey identifies security, identity as #2 of 8 IT priorities: 55.8% list it as one of top priorities  Because mobile devices do so much more than email now, mobile security is impossible to ignore  Security is being built into strategic thinking around mobility – perhaps the time taken to wrestle with finding the right solution is behind the finding that so much mobile activity still goes unmanaged?
  • 21. 21 © 2015 IBM Corporation IBM Security Overview
  • 22. © 2015 IBM Corporation IBM Security 22 The IBM mobile security framework CA, Oracle, RSA Configure devices & manage security policies Automate enforcement Mitigate risks of lost or compromised devices Distribute & manage enterprise apps Separate work & personal data Protect apps & data from vulnerabilities Enable work content availability & sharing Create & edit content Contain sensitive corporate information Provide secure web & mobile access control Deliver ease-of-use with SSO & unified identity management Extend Security Intelligence Extend security information & event management (SIEM) to mobile environment Incorporate log management, anomaly detection, configuration & vulnerability management Manage Access and Fraud Secure Content and Collaboration Safeguard Applications and Data Protect Devices
  • 23. © 2015 IBM Corporation IBM Security 23 Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access
  • 24. © 2015 IBM Corporation IBM Security 24 Why IBM MobileFirst Protect? Integrated solutions that connect seamlessly to your existing and external environments Scalable data security with intelligence for the volume, speed, and variability of mobile Complete management of devices, apps, content and users from a single platform
  • 25. © 2015 IBM Corporation IBM Security 25 www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.