Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. Omri HolzmanSecurity Services Mobile StrategyWorking securely anywhere, anytime, from any device © 2012 IBM Corporation
  2. 2. Mobility is a significant component of the evolution of computing. Mobile wireless cloud Web desktop Client server @ Security risksHostmainframe 8X increase in security risk driven by proliferation of mobile data and devices2 Consumerization of IT 62% of devices used for business Mobile applications 85B in 2012 will be owned by the mobile applications will be individual1 downloaded in 2012, up from 38 billion in 20113 Sources: 1. IDC, “Worldwide Business Use Smartphone Forecast and Analysis,” doc #225054, September 2010; 2. IBM X-Force 2011 Trend and Risk Report, March 2011; 3. IDC, “Predictions 2012: Competing for 2020,” p. 8, doc #231720 © 2012 IBM Corporation
  3. 3. Mobile presents an enormous set of opportunities to enterprisesacross all industries. Banking Insurance Healthcare Telecom Retail Government Others Existing Enterprise Applications and Infrastructure Platform Workforce Product and Customer Care 3rd Party Mobility Optimization Service Innovation and Insights Services Social User Location Mobile Social Mobile Collaboration Notification Services Payments Commerce Extending business Improve operational Differentiate the Enable new services to mobile customers efficiencies and reduce customer experience and business models and workforce costs Business Results3 © 2012 IBM Corporation
  4. 4. Yet, mobile brings business and IT challenges… • “Consumerization of IT” forcing CIOs to have BYOD policy and Business and IT plan; provide employee device choice change • Anytime, anywhere, any device access now standard • Social business interactions are increasingly important • Protection of privacy and confidential information Security and • Policies for client-owned smartphones and tablets management • Visibility, security and management of mobile platform requirements • Infrastructure complexity from multiple device platforms Complexity and • Unique mobile requirements for employees/workers integration • Extending data, voice and video applications to mobile devices • Integrating across wireline/wireless LAN platforms © 2012 IBM Corporation
  5. 5. A successful mobile enterprise starts with a step-by-stepapproach. Develop mobile Enable corporate e- 1 strategy and establish corporate policy 4 mail, contact and calendar 2 Enable mobile network infrastructure 5 Develop application strategy 3 Secure mobile devices 6 Deploy and manage applications © 2012 IBM Corporation
  6. 6. Mobile Develop mobile strategy and establish corporate policy Scope: Business to consumer and business to enterprise. What business problem am I trying to solve with mobility? Corporate policy: Is there a corporate policy that 1 speaks to Bring Your Own Device? (BYOD) Do I need an acceptable use policy? What’s Probing Questions: the policy for mobile expense reimbursement and arrangements with mobile carriers? Security and compliance: What are the corporate security and compliance requirements and how are they enforced? Support: What devices are supported? How is support provided? Can I leverage automation or self-service support to reduce costs?We need to reset the agenda from just Mobile DeviceManagement to: Effective management of all of a mobile worker’s devices including the life-cycle of the development, testing, deployment and remediation of their critical mobile applications.6 © 2012 IBM Corporation
  7. 7. MobileEnable mobile network infrastructure 2Challenge: To securely connect smart phones and tablets to the corporate network to accessenterprise dataWi-Fi coverage at corporate locations for employees and guestsNetwork access controlVirtual Private Network (VPN) access when away from the office and accessing enterprisedata behind the corporate firewall7 © 2012 IBM Corporation
  8. 8. MobileSecure mobile devices Top security concerns 3 • Lost and stolen devices • Data leakage • Unauthorized access to corporate resources • Spread of malware infections from mobile devices to the company network • Separation of work and personal data Solutions • Mobile Device Management • Mobile Data Management • Anti-malware • Cloud and on-premise solutions8 © 2012 IBM Corporation
  9. 9. MobileEnable corporate e-mail, contact and calendar E-mail, contacts and calendar Lotus Domino, Microsoft Exchange 4 Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry Enterprise Server, Good for Enterprise Native e-mail and third party clients9 © 2012 IBM Corporation
  10. 10. MobileDevelop application strategy Business to employee and business to consumer Collaboration, Social media, Business analytics, Line of business applications 5 Network and security considerations Buy vs. build Mobile application architectures: native, web, hybrid, virtual Development tools: xPages, Objective-C, Java, Mobile Enterprise Application Platform (MEAP)10 © 2012 IBM Corporation
  11. 11. MobileDeploy and manage applications Business to consumer and business to enterprise 6 Distribute, update, manage, and secure mobile applications on both personal and corporate- owned mobile devices Mobile application lifecycle management Mobile application security & compliance management Many Mobile Device Management solutions provide Mobile Application Management features as well11 © 2012 IBM Corporation
  12. 12. MobileBuild, connect, manage and secure your mobile enterpriseIBM Mobile Foundation Includes • IBM Worklight • IBM WebSphere Cast Iron IBM Mobile • IBM Endpoint Manager for Mobile Foundation Devices Plus Services Offering • Mobile infrastructure Strategy and Planning • IBM hosted Mobile Device Security • Managed Mobility • Mobile application platform management12 © 2012 IBM Corporation
  13. 13. MobileDelivering for multiple mobile platformsIBM WorklightFast and cost-effective development, integration and management of rich, cross-platform mobileapplications Client Challenge Using standards-based technologies and tools and delivering an enterprise-grade services layer that meets the needs of mobile employees and customers Key Capabilities Mobile optimized middleware • Open approach to 3rd-party integration • Mix native and HTML • Strong authentication framework • Encrypted offline availability • Enterprise back-end connectivity • Unified push notifications Worklight is not only about • Data collection for analytics • Direct updates and remote disablement mobile app UI creation! It is a full • Packaged runtime skins mobile middleware13 © 2012 IBM Corporation
  14. 14. Mobile Secured byEndpoint Manager for Mobile BigFix policy EndDevices – The Solution UserEnable password policiesEnable device encryptionForce encrypted backup • Personal Mail / CalendarDisable iCloud sync • Personal AppsAccess to corporate email, Corporate Profileapps, VPN, WiFi contingent on • Enterprise Mail / Calendar • Enterprise Access (VPN/WiFi) VPN / WiFi Corporatepolicy compliance! • Enterprise Apps (App store or NetworkSelectively wipe corporate data Custom) Accessif employee leaves company Encryption EnabledFully wipe if lost or stolen iCloud iCloud Sync iTunes Sync14 © 2012 IBM Corporation IBM & Business Partner Confidential
  15. 15. MobileHosted Mobile Device Security, fully managed service that canhelp protect mobile devices used by employees to accesscorporate data Our solution can provide the most important security controls: Data protection for unattended, lost or stolen devices Threat mitigation to help protect against spyware and viruses that can infect mobile devices and corporate systems when the devices connect to the network Risk mitigation by helping to limit access to applications that can expose the corporation to liability Insider threat investigation tools Encrypted connectivity between the device and the corporate network1515 © 2012 IBM Corporation
  16. 16. MobileMobility and BYOD: It is a company-wide project… Finance / Network Cost Control Team Security / Compliance Endpoint Team Application Team Human Resources16 © 2012 IBM Corporation
  17. 17. Mobile…which needs to be considered and planned verycarefully.. Finance / Network Cost Control Telecom Expense Team Networking Strategy & Management Optimization / Network Managed Services Security / Compliance Hosted Device /Managed Security Services Endpoint Mobile Team Infrastructure Strategy & Planning Application / Managed Mobility Team Mobile Application Platform HR Management Mobile Strategy / Policy Consulting17 © 2012 IBM Corporation
  18. 18. MobileIBM provides range of mobility services, that whenbundled can improve competitiveness TEM Secure Mobile Messaging TEM Virtual TEM Desktop Customer MDM Customer B MDM Network C Customer Security MDM Network Antivirus Security Apps A Security Apps18 © 2012 IBM Corporation | November 5, 2012 Not for
  19. 19. 19 © 2012 IBM Corporation