Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IBM mobile strategy at Innovate 2012


Published on

Mobile Strategy presentation at IBM's Rational Conference (Innovate)

Published in: Technology, Business

IBM mobile strategy at Innovate 2012

  1. 1. IBM Mobile StrategyBusiness partner day 1© 2012 IBM Corporation
  2. 2. 2© 2012 IBM Corporation
  3. 3. Mobile is a transformational 10 Billion devices by 2020 61% of CIOs put mobile as priority 45% increased productivity with mobile apps 3© 2012 IBM Corporation
  4. 4. Mobile presents an enormous set of opportunities… Business to Enterprise Business to Consumer • Increase worker productivity • Improve customer satisfaction • Improved claims processing • Deeper customer engagement and loyalty • Increase revenue through sales engagements • Drive increased sales through Personalized offers • Extend existing applications to mobile workers and customers • Customer service • Reducing fuel, gas, or fleet maintenance costs • Competitive differentiator that are relevant in particular industries • Improve brand perception • Increase employee responsiveness and • Deeper insight into customer buying decision making speed behavior for up sell and cross sell • Resolve internal IT issues faster • Improve in store experience with mobile • Reduce personnel cost (utilizing personal concierge services owned instead of corporate issued devices) 4© 2012 IBM Corporation
  5. 5. Customers are focused on a new set of mobile “client initiatives” Client Initiatives Build mobile Manage mobile Extend existing applications devices and business capabilities Connect to, and run applications to mobile devices backend systems in Secure my mobile Transform the support of mobile business business by creating new opportunities *ING Canada Concord Hospital improved patch compliance 50%, reduced software license costs 25%, and has not had a single malware infection since implementation of IBM Endpoint Manager for patch management and core protection Key Capabilities Key Capabilities Key Capabilities • Mobile web app development • Mobile Device Management • Strategy and planning services • Enterprise data, service, and • Secure Network • Mobile-enabled solutions application integration Communications & including analytics, commerce, • Mobile Lifecycle Management Management and social business • Device analytics and control • Implementation and hosting services 5© 2012 IBM Corporation
  6. 6. But mobile also brings business and IT challenges Bring Your Own Device to Work (“BYOD”) Cross-platform Development Considerations – Ability to create the user interface that you need – Avoiding the lowest-common-denominator pitfall – Learning curve – Avoiding vendor lock-in / technology that won’t keep up Top Mobile Adoption Concerns: Using What the Device Has to Offer 1. Security/privacy (53%) R&D Processes and Developer Teams 2. Cost of developing for multiple mobile platforms (52%) Back-end Data Integration 3. Integrating cloud services to mobile Security and Authentication devices (51%) Post-deployment control of apps Source: 2011 IBM Tech Trends Report 6© 2012 IBM Corporation
  7. 7. Customers are looking for a mobile platform that solves their needs Banking Insurance Healthcare Telecom Retail Government Others IBM Enterprise Mobile Platform Business Results Extending business Improve operational Differentiate the Enable new services to mobile customers efficiencies and customer experience and business models and workforce reduce costs Workforce Product and Customer Care 3rd Party Mobility Optimization Service Innovation and Insights Services Social User Location Mobile Social Mobile Collaboration Notification Services Payments Commerce Build mobile Manage mobile Extend existing applications devices and business capabilities Connect to, and run applications to mobile devices backend systems in Secure my mobile Transform the support of mobile business business by creating new opportunities 7© 2012 IBM Corporation
  8. 8. Mobile client initiatives: Build and Connect Client Initiatives Build mobile Manage mobile Extend existing applications devices and business capabilities Connect to, and run applications to mobile devices backend systems in Secure my mobile Transform the support of mobile business business by creating new opportunities Customers can now build enterprise mobile applications that: • Run on multiple mobile devices • Connect to enterprise back-end applications and information systems • Fulfills fast time-to-market requirements and can be rapidly updated with new releases • Deliver high quality user experience 8© 2012 IBM Corporation
  9. 9. Worklight Introduction Worklight is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps. 9© 2012 IBM Corporation
  10. 10. Worklight mobile platform overview Worklight Studio A complete, extensible environment with maximum code reuse and per-device optimization Worklight Server Unified notifications, runtime skinning, version management, security features, integration and delivery Worklight Runtime Components Extensive libraries and client APIs that expose and interface ← with native device functionality and the Worklight server Worklight Console A web-based console for real-time analytics and control of your mobile apps and infrastructure 10© 2012 IBM Corporation
  11. 11. Worklight Architecture Overview11 11 © 2012 IBM Corporation
  12. 12. Downloadable (Native) Apps High-quality user experience and full device Application access. Stores File System (on mobile device) Platform-specific, requires unique expertise, Native App expensive to develop and (Java/Objective-C/C#) maintain. Mobile Operating System 12© 2012 IBM Corporation
  13. 13. Web Apps Web Server Written in HTML5 JavaScript and CSS3. Mobile Browser Quick and cheap to develop. Native App (Java/Objective-C/C#) Less powerful than native and limited device access. Mobile Operating System 13© 2012 IBM Corporation
  14. 14. Hybrid Apps Combines best of both worlds: Application Stores File System (on mobile device) Primarily written in HTML5, CSS, JS while allowing full access to Native Container device capabilities. HTML, CSS, JavaScript Mobile Operating System 14© 2012 IBM Corporation
  15. 15. Hybrid Coding – Why Mix Native and Web? Write the majority of the code in reusable web languages Maximize user experience and achieve unique functionality with native code15 15 © 2012 IBM Corporation
  16. 16. Worklight Studio • Eclipse-based IDE • Combining native and standard web technologies in one multiplatform app • Environment-specific optimization • 3rd-party libraries integration • Device SDK integration • Back-end connectivity utilities16 16 © 2012 IBM Corporation
  17. 17. Single Shared Codebase Common code placed in primary file Environment optimization code is maintained separately 17© 2012 IBM Corporation
  18. 18. Incorporated Device SDKs 18© 2012 IBM Corporation
  19. 19. Integrating Best-in-class Tools Worklight is compatible with prominent HTML5 libraries and tools: 19© 2012 IBM Corporation
  20. 20. Runtime Skins – Use Cases Different Screen Sizes Different Screen Densities Different Input Method Support for HTML5 20© 2012 IBM Corporation
  21. 21. Distributed Mobile Development Ease of Development Control and Governance Centralized Distributed Automatic Centralized Shell app policy inspection development development enforcement 21© 2012 IBM Corporation
  22. 22. The Rational and Worklight Studio joint solution Rational solution for Collaborative Lifecycle Management Requirements Management Rational Requirements Composer Quality Software Change & Application Development Management Configuration Management Rational Quality Manager Rational Team Concert Studio On-device testing (partner) Rational Application Developer Build & Deploy Management Application Development Rational Team Concert 22© 2012 IBM Corporation
  23. 23. The Rational Team Concert (RTC) Build Engine integrationprovides a controlled build environment for mobile apps – bothnative and hybrid Studio Team Concert Client Build SCM Team repository of apps executables, sources logfiles Builder RIM Android iOS SDK SDK SDK 23© 2012 IBM Corporation
  24. 24. Worklight Server • Distribution of mobile web apps • Enterprise connectivity: • Secure client/server connectivity • Direct access to enterprise back-end data and transaction capabilities • Authentication enforcement • Client control: • Application version management and remote disabling • Direct update of application code • Unified Push Notifications • Aggregation of usage statistics24 24 © 2012 IBM Corporation
  25. 25. Back-end Integration Secure back-end integration XML-based declarative specification Multi-source data mashups Eclipse plug-in supporting auto-complete and validation Simplified adapter testing Server-side debugging Web services and JDBC integration Access to session data and user properties 25© 2012 IBM Corporation
  26. 26. IBM Mobile Foundation – Worklight (WL) & Cast Iron Bundle Connects Worklight Apps with Cloud & On Premise Applications in Days IBM Mobile Foundation Bundle Cloud Applications Mobile Apps IBM WebSphere built on Worklight Worklight Cast Iron Enterprise Server Hypervisor Apps Edition 6.1 On-premise Applications IBM Mobile Foundation 26© 2012 IBM Corporation
  27. 27. Companies engaging across traditional boundaries Extending boundaries via Cloud apps, mobile apps and business APIs Mobile Applications Cloud Applications Web APIs 27© 2012 IBM Corporation Back-end Systems
  28. 28. Flexible Push Notification Framework Common APIs for both iOS and Android One application multiple devices Custom subscription management Many-to-many relationship between event sources and apps Multiple event sources from same back-end Multiple users logging into the same app 28© 2012 IBM Corporation
  29. 29. Device Runtime Components • Framework for server integration: • Secure server connectivity • Authentication • Remote disable & notification • Push registration • Event reporting for analytics & audit • Cross-platform compatibility layer • Runtime Skinning • Secure encrypted storage29 29 © 2012 IBM Corporation
  30. 30. Security Features Mapping Protecting data on Enforcing the device security updates Secure Jailbreak Encrypted App Offline challenge- and Remote Direct offline authenticity authentication response on malware disable update cache testing startup detection Mobile Authenticati SSL with Data Coupling Proven platform as on server Code protection device id platform a trust integration identity obfuscation framework realms with user id security factor verification Streamlining Providing robust Application Corporate security authentication and processes authorization Security 30© 2012 IBM Corporation
  31. 31. Worklight Console • Application Version Management • Push management • Usage reports and analytics • Reports of custom application events • Configurable audit log • Administrative dashboards for: • Deployed applications • Installed adapters • Push notifications • Data export to BI enterprise systems31 31 © 2012 IBM Corporation
  32. 32. App Management 32© 2012 IBM Corporation
  33. 33. Data Collection and Analytics 33© 2012 IBM Corporation
  34. 34. Advanced Reporting Functionality34 2012 IBM Corporation © 34
  35. 35. Rich, cross-platform application development IBM Worklight V5.0 Enables flexible development, back-end integration and ongoing management of rich, cross-platform mobile apps using native and standards-based HTML technologies and tools Mobile-optimized middleware delivering an enterprise-grade solution that meets the needs of mobile employees and customers Key capabilities:  Drag and Drop Visual development Fast and cost-effective  Mobile simulator for mobile emulation and testing development, integration and  app store for iterative development management of enterprise  Strong authentication framework mobile applications.  Encrypted offline data store IBM Worklight, Developer  Enterprise back-end connectivity edition V5.0 is licensed for  Unified push notifications development use only at no  Data collection for analytics charge  Direct updates and remote disablement  Packaged runtime skins  Expanded platform support 35 © 2012 IBM Corporation
  36. 36. Comprehensive solution for mobile delivery IBM Mobile FoundationV5.0 A comprehensive suite that provides the essential elements needed for mobile applications development, deployment, and management. Mobile Foundation:  IBM Worklight for mobile application development, delivery and management End to end solution for mobile application  IBM Endpoint Manager for Mobile development, connectivity Devices for complete end-to-end and device management Mobile Device Management (MDM)  IBM WebSphere Cast Iron Hypervisor Edition advanced connectivity to back-end and cloud systems 36 © 2012 IBM Corporation
  37. 37. IBM Worklight Studio V 5.0 The IBM Worklight studio provides a visual development environment for building rich mobile applications . Helps accelerate development time while reducing errors. Key capabilities:  WYSIWYG UI Construction  Drag and Drop components  Code Assist  Fast Preview in browser with device simulation A visual mobile app  Integration with Native SDK development environment  Integration with Rational Team Concert Helps accelerate development, rapid  Integration with RAD via shell sharing prototypes, fast simulation,  Maximize code reuse across mobile platforms reduces errors. Bundled with RAD 37 © 2012 IBM Corporation
  38. 38. Mobile Application Center A cross platform private mobile application store similar to public app stores but focused on the needs of an organization or a team Ease highly iterative development process and distribution of mobile applications Key capabilities:  Delivers distribution and management of mobile applications within a company / teams  Easy distribution of iOs and Android apps within a team App store supporting  Supports any mobile applications iterative development lifecycle  Provides versioning and updates to improve collaboration with  Centralizes rating and feedback information application stakeholders, QA  Controls who can modify or install an and Development teams application  Cross platform, technology  Easy to install and simple to run agnostic mobile application store 38 © 2012 IBM Corporation
  39. 39. Mobile client initiatives: Manage and Secure Client Initiatives Build mobile Manage mobile Extend existing applications devices and business capabilities Connect to, and run applications to mobile devices backend systems in Secure my mobile Transform the support of mobile business business by creating new opportunitiesCustomers can now: • Use IBM Endpoint Manager for mobile IBM Endpoint Manager for visibility, security and management Mobile Devices – extending visibility, control and • Use IBM Security Access Manager to automation for mobile authenticate and authorize mobile users and devices IBM Security Solutions • Utilize managed services for complete mobile landscape management 39© 2012 IBM Corporation
  40. 40. Extending visibility, control and automation to mobile devices IBM Endpoint Manager for Mobile Devices Building on the July 2010 BigFix acquisition Common Available March 2012: management agent and console • Advanced management for iOS, Systems Security Android, Symbian, and Windows management management Phone Near-instant deployment of new features • Unified management automatically enables VPN access based on security compliance • Integration with back-end IT IBM Endpoint Manager management systems such as service desk, CMDB, and SIEM • Security threat detection and automated remediation • Extends IBM’s existing 500,000 endpoint deployment Desktop / laptop / Mobile Purpose-specific server endpoint endpoint endpoint 40© 2012 IBM Corporation
  41. 41. Mobile Security Enabled with IBM Solutions IBM QRadar Achieve Visibility & Enable System-wide Mobile Security Awareness Adaptive Security Posture • Risk Assessment • Threat Detection Build & Run Safe Mobile AppsSecure Data & the Device Protect Access to Enterprise IBM WorkLight Apps & Data Develop safe mobile apps IBM WorkLight • Direct Updates Runtime for safe mobile apps IBM Security Access • Encrypted data cache Manager for Mobile IBM AppScan for Mobile • App validation Authenticate & Authorize users and Vulnerability testing devices • Dynamic & Static analysis of Hybrid IBM Endpoint • Standards Support: OAuth, and Mobile web apps SAML, OpenID Manager for Mobile • Single Sign-On & Identity Configure, Provision, Monitor Mediation IBM DataPower • Set appropriate security Protect enterprise applications policies • XML security & message • Enable endpoint access IBM Mobile Connect protection • Ensure compliance Secure Connectivity • Protocol Transformation & • App level VPN Mediation Internet 41 © 2012 IBM Corporation
  42. 42. Mobile client initiatives: Extend and Transform Client Initiatives Build mobile Manage mobile Extend existing applications devices and business capabilities Connect to, and run applications to mobile devices backend systems in Secure my mobile Transform the support of mobile business business by creating new opportunities Customers can now • Use our strategy and planning services to build a Social collaboration mobile strategy and transform their business software – mobile access to enterprise • Use our industry frameworks and solutions social collaboration delivered via software, strategy, managed services and business process consulting IBM Mobile Enterprise Services: • Use mobile to engage their own customers in handles your secure new ways with WebSphere Commerce and IBM mobile device and Social Collaboration software application deployment and management 42© 2012 IBM Corporation
  43. 43. 43© 2012 IBM Corporation
  44. 44. 44© 2012 IBM Corporation
  45. 45. Important LinksResource LocationIBM Mobile Enterprise www.worklight.comWorklight Trial Dirk Nicol – Program Director, IBM Enterprise Mobile 45© 2012 IBM Corporation
  46. 46. Mobile Security Measures Mechanism Benefits Details Encrypted offline • Protect against stealing sensitive • Uses AES256 and PCKS #5 for on-device encrypted storage of app-generated cache information via malware, stolen information, with random server-generated numbers for high security devices • Allows user authentication when server is offline • Implemented in JS (highly obfuscated) with optional native performance enhancements SSL identity • Protect against man-in-the-middle • Client-side AJAX framework automatically verifies Worklight-server verification for AJAX attacks credentials Client code attestation • Prevent impersonation by • Challenge-response based mechanism for proving client-application identity phishing apps • Uses tamper-resistant self-inspecting code • Protect apps from manipulation by malware Remote code updates • Ensure timely propagation of • New versions of the code can be distributed without requiring update of the critical security updates to entire app (currently JS/HTML) install base Remote disable of • Ensure timely propagation of • Server-side console allows configuration of allowed app versions. specific versions critical security updates to entire Administrator can force users to install security updates to the native code install base Authentication • Lower the cost and complexity of • Server-side architecture for integration with back-end authentication process framework robust integration with the infrastructure based on JAAS, with Authentication realms authentication infrastructure • Client-side framework for asynchronous login requests on session expiration Server-side safeguards • Prevention of SQL injection • Prepared-statement enforcement • XSRF protection • Validation of submitted data against session cookie Device identification • Prevent account-hijacking • Safely report device ID to the server • Identifying a user with specific devices46 46 © 2012 IBM Corporation
  47. 47. Mobile Security Measures (cont’d) Mechanism Benefits Details • Leverage existing enterprise • Client side mechanism obtains and encrypts user credentials, sends to the Enterprise SSO authentication facilities and user server with requests integration credentials • Encryption incorporates user-supplied PIN, Server side secret and deviceID • Enable employee-owned devices • Credentials cannot be retrieved from lost or stolen device • Enable the secure delivery and • Client side and server side framework act as SSL based VPN VPN alternative operation of mobile applications • Network access control and policies pre-configured in the client side for employee owned devices or framework layer device types not allowed on the • Network access and security measures updated using server side framework corporate network • On device encrypted storage to prevent compromise of sensitive data • Enable the secure delivery in cases where the installation of VPN client on mobile devices is not possible or complicated to manage47 47 © 2012 IBM Corporation