SlideShare a Scribd company logo
1 of 28
Download to read offline
ID505 BYOD at IBM - IBM Lotus Notes
                    Traveler, IBM Connections Mobile,
                    IBM Endpoint Manager and More!
                    Chris Pepin | IBM Mobile Technology Evangelist




© 2013 IBM Corporation
You are encouraged to use your mobile
device during this presentation

             #IBMConnect
             #IBMConnectID505




2
Objectives

 Share the IBM internal story on becoming a mobile enterprise


 What worked…what didn’t


 The next steps on IBM’s mobile enterprise journey


 Engaging IBM to assist with your mobile deployment




3
IBM

 435,000 employees worldwide


 50% of employees are mobile


 120,000 employees using smartphones and tablets; 80,000 are BYOD




4
BYOD = Bring Your Own Device

 The use of personally-owned devices
  such as smartphone, tablets and laptops
  for business purposes                     IBM's BYOD program "really
                                            is about supporting
                                            employees in the way they
                                            want to work. They will find
                                            the most appropriate tool to
 Impossible to stop BYOD – employees       get their job done. I want to
                                            make sure I can enable them
  will “find a way”                         to do that, but in a way that
                                            safeguards the integrity of our
                                            business.“

                                            - IBM CIO Jeanette Horan
 BYOD isn’t new at IBM – expanding
  mobile services is




5
How IBM became a mobile enterprise




                           Strategy



              Education                Policy



                          Technology
The mobile enterprise starts with defining a strategy


 Business problem


 Personas and use cases

                                             Strategy
 Mobile applications
IBM’s mobile strategy


 Embrace smartphones, tablets &
  BYOD


 Increase employee flexibility,
  productivity and satisfaction
                                             Strategy

 Security is a key requirement: trust but
  verify
Written corporate mobile policy is essential


 Terms and conditions


 Corporate owned devices & BYOD

                                               Policy
 Collaborative effort by information
  technology, security, human resources,
  legal, procurement and reimbursement
IBM’s mobile policy


 Single policy for PCs, smartphones and
  tablets published on IBM’s intranet


 Addresses corporate-owned as well as
  BYOD (opt-in)
                                           Policy

 Collaborative effort by information
  technology, security, human resources,
  legal, procurement and reimbursement
Technology implements and enforces corporate policy


 Endpoint management


 Data & application management


 Network access                        Technology


 Anti-malware


 Authentication
Mobile technology in use inside IBM


 BlackBerry Enterprise Server
 IBM Lotus Notes Traveler
 IBM Endpoint Manager
 IBM Sametime Mobile
 IBM Connections Mobile              Technology
 IBM Worklight
 IBM Mobile Connect
IBM Lotus Notes Traveler


 Two way-synchronization of email,
  contacts and calendar


 Support for Apple iOS, Google Android,
  Windows Mobile and Symbian.
  Windows Phone support coming
  1Q2013
IBM Endpoint Manager


 Mobile Device Management (MDM) for
  smartphones, tablets, PCs and servers


 Compliments IBM Traveler with
  advanced management including
  jailbreak detection, anti-malware
  compliance and compliance with
  corporate security policy
IBM Lotus Notes Traveler and IBM Endpoint Manager are
complimentary




15
IBM Sametime and IBM Connections


 Instant messaging


 Social business


 Moving beyond e-mail
IBM Worklight


 Develop custom native, web, HTLM5 and
  hybrid applications


 Support for multiple platforms including
  Apple iOS, Android, BlackBerry and
  Windows Phone


 Components include studio, server,
  runtime, console and app center
IBM Mobile Connect


 Secure Virtual Private Network solution


 Connects smartphones and tablets on
  the public Internet securely with
  corporate network (e.g. Traveler,
  Sametime, Connections)


 Invisible to end users: superior end-
  user experience
Employees are the weakest security link and education is
essential

 Identifying cybersecurity threats


 Protecting corporate and client data


 Safeguarding devices                   Education


 Data and security incident reporting


 Build a “culture of security”
IBM Mobile Education


 Business Conduct Guidelines


 Digital IBMer secure computing online
  education

                                          Education
 IT Help Central


 Social sharing via IBM Connections


 Technology Adoption Program (TAP)
The next steps of IBM’s mobile journey

 Increasing infrastructure capacity to support
  more mobile devices


 More mobile applications


 Network access control and corporate wi-fi
  enhancements


 Containerization




21
Lessons learned



 Don’t try to boil the ocean – walk before you run


 Open and frank communication with employees


 The mobile enterprise continues to evolve – be flexible and embrace change


 Reach out for help from mobile experts - IBM CIO partnered with IBM Global
  Technology Services




22
IBM offers products and services to address the complete
mobile lifecycle

                                         Connect to backend
                          Build mobile   systems
                          applications


      Assess and Plan                                 Manage mobile devices
      enterprise mobile                               and applications
      strategy


                                                       Secure your
                                                       mobile business

                  Transform the
             business by creating         Extend existing business
               new opportunities          capabilities to mobile devices




23
By engaging a services provider, leading businesses
accelerate value from mobile



2/3
of chief information officers
                                                                         Free IT staff to focus on other
                                                                         business-critical initiatives


(CIOs) plan to partner
extensively to gain new                                                  Leverage additional skill sets
skills and expertise                                                     as needed




20%                                                                      Gain in-depth expertise of
                                                                         methodologies and tools

productivity gains and cost
savings experienced by                                                   Have wider range of mobile
CIOs who have outsourced                                                 activities underway
key mobile services



Source: The New Workplace CIO Study, IBM Market Insights, October 2011
Many IBM clients have already experienced the benefits of a
holistic approach to a mobile-enabled enterprise


         Consolidating a ruggedized      Banking on BYOD:
         mobile device strategy to       leveraging secured mobility
         streamline logistics and        services to improve
         reduced operating costs         enterprise application access



                  Transportation                     Banking


         North American freight firm     European bank implemented
         improved product delivery,      a BYOD program for
         inventory management and        smartphone and tablet
         logistics support while         access to corporate email,
         cutting costs with ruggedized   contacts, calendar, intranet
         mobile devices.                 and applications




25
For more information

IBM mobile enterprise
ibm.com/mobile-enterprise

IBM mobile services
ibm.com/services/mobility

IBM mobile software
ibm.com/software/solutions/mobile-enterprise/

YouTube videos
youtube.com/ibmmobileenterprise



        @IBMMobile



26
For more information – continued

IBM CIO video, whitepaper presentation
chrispepin.com/2012/11/how-ibm-became-mobile-enterprise.html

An integrated approach to managing and securing your mobile environment
public.dhe.ibm.com/common/ssi/ecm/en/tis14115usen/TIS14115USEN.PDF
IBM mobile frontier blog
ibm.com/developerworks/mydeveloperworks/blogs/mobileblog




        @ChrisPepin




27
Legal disclaimer
     © IBM Corporation 2013. All Rights Reserved.
     The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is
              provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM
              shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect
              of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
     References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this
             presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way.
             Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.




28           © 2013 IBM Corporation

More Related Content

What's hot

BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 

What's hot (20)

BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
BYOD in an Enterprise
BYOD in an EnterpriseBYOD in an Enterprise
BYOD in an Enterprise
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 

Viewers also liked

SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment stefriche0199
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!SolarWinds
 
tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your OrganizationCognizant
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcareBitglass
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparisonPeter Hewer
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD ChecklistPip Cleaves
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD PlanSam Gliksman
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationCisco Services
 

Viewers also liked (16)

SDN a strategic assessment
SDN a strategic assessment  SDN a strategic assessment
SDN a strategic assessment
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015tyntec BYOD User Survey 2015
tyntec BYOD User Survey 2015
 
Intro to SDN - Part I
Intro to SDN - Part IIntro to SDN - Part I
Intro to SDN - Part I
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD Checklist
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 

Similar to IBM Connect 2013: BYOD at IBM

Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolIBM Danmark
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Ed Brill
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise Daryl Pereira
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Understanding the Tremendous Value of Mobile Analytics
Understanding the Tremendous Value of Mobile AnalyticsUnderstanding the Tremendous Value of Mobile Analytics
Understanding the Tremendous Value of Mobile AnalyticsDataClarity Corporation
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomyDATAVERSITY
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteLeigh Williamson
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteMasha Geller
 

Similar to IBM Connect 2013: BYOD at IBM (20)

Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian Cagnol
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...Five things we have learned about mobility from our clients -- IBM, Alistair ...
Five things we have learned about mobility from our clients -- IBM, Alistair ...
 
A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise A strategic guide to becoming a mobile enterprise
A strategic guide to becoming a mobile enterprise
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Understanding the Tremendous Value of Mobile Analytics
Understanding the Tremendous Value of Mobile AnalyticsUnderstanding the Tremendous Value of Mobile Analytics
Understanding the Tremendous Value of Mobile Analytics
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App Economy
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
APPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew KeynoteAPPNATION IV - IBM - Phil Buckellew Keynote
APPNATION IV - IBM - Phil Buckellew Keynote
 

More from Chris Pepin

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesChris Pepin
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at homeChris Pepin
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Chris Pepin
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMChris Pepin
 

More from Chris Pepin (19)

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at home
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
 

IBM Connect 2013: BYOD at IBM

  • 1. ID505 BYOD at IBM - IBM Lotus Notes Traveler, IBM Connections Mobile, IBM Endpoint Manager and More! Chris Pepin | IBM Mobile Technology Evangelist © 2013 IBM Corporation
  • 2. You are encouraged to use your mobile device during this presentation #IBMConnect #IBMConnectID505 2
  • 3. Objectives  Share the IBM internal story on becoming a mobile enterprise  What worked…what didn’t  The next steps on IBM’s mobile enterprise journey  Engaging IBM to assist with your mobile deployment 3
  • 4. IBM  435,000 employees worldwide  50% of employees are mobile  120,000 employees using smartphones and tablets; 80,000 are BYOD 4
  • 5. BYOD = Bring Your Own Device  The use of personally-owned devices such as smartphone, tablets and laptops for business purposes IBM's BYOD program "really is about supporting employees in the way they want to work. They will find the most appropriate tool to  Impossible to stop BYOD – employees get their job done. I want to make sure I can enable them will “find a way” to do that, but in a way that safeguards the integrity of our business.“ - IBM CIO Jeanette Horan  BYOD isn’t new at IBM – expanding mobile services is 5
  • 6. How IBM became a mobile enterprise Strategy Education Policy Technology
  • 7. The mobile enterprise starts with defining a strategy  Business problem  Personas and use cases Strategy  Mobile applications
  • 8. IBM’s mobile strategy  Embrace smartphones, tablets & BYOD  Increase employee flexibility, productivity and satisfaction Strategy  Security is a key requirement: trust but verify
  • 9. Written corporate mobile policy is essential  Terms and conditions  Corporate owned devices & BYOD Policy  Collaborative effort by information technology, security, human resources, legal, procurement and reimbursement
  • 10. IBM’s mobile policy  Single policy for PCs, smartphones and tablets published on IBM’s intranet  Addresses corporate-owned as well as BYOD (opt-in) Policy  Collaborative effort by information technology, security, human resources, legal, procurement and reimbursement
  • 11. Technology implements and enforces corporate policy  Endpoint management  Data & application management  Network access Technology  Anti-malware  Authentication
  • 12. Mobile technology in use inside IBM  BlackBerry Enterprise Server  IBM Lotus Notes Traveler  IBM Endpoint Manager  IBM Sametime Mobile  IBM Connections Mobile Technology  IBM Worklight  IBM Mobile Connect
  • 13. IBM Lotus Notes Traveler  Two way-synchronization of email, contacts and calendar  Support for Apple iOS, Google Android, Windows Mobile and Symbian. Windows Phone support coming 1Q2013
  • 14. IBM Endpoint Manager  Mobile Device Management (MDM) for smartphones, tablets, PCs and servers  Compliments IBM Traveler with advanced management including jailbreak detection, anti-malware compliance and compliance with corporate security policy
  • 15. IBM Lotus Notes Traveler and IBM Endpoint Manager are complimentary 15
  • 16. IBM Sametime and IBM Connections  Instant messaging  Social business  Moving beyond e-mail
  • 17. IBM Worklight  Develop custom native, web, HTLM5 and hybrid applications  Support for multiple platforms including Apple iOS, Android, BlackBerry and Windows Phone  Components include studio, server, runtime, console and app center
  • 18. IBM Mobile Connect  Secure Virtual Private Network solution  Connects smartphones and tablets on the public Internet securely with corporate network (e.g. Traveler, Sametime, Connections)  Invisible to end users: superior end- user experience
  • 19. Employees are the weakest security link and education is essential  Identifying cybersecurity threats  Protecting corporate and client data  Safeguarding devices Education  Data and security incident reporting  Build a “culture of security”
  • 20. IBM Mobile Education  Business Conduct Guidelines  Digital IBMer secure computing online education Education  IT Help Central  Social sharing via IBM Connections  Technology Adoption Program (TAP)
  • 21. The next steps of IBM’s mobile journey  Increasing infrastructure capacity to support more mobile devices  More mobile applications  Network access control and corporate wi-fi enhancements  Containerization 21
  • 22. Lessons learned  Don’t try to boil the ocean – walk before you run  Open and frank communication with employees  The mobile enterprise continues to evolve – be flexible and embrace change  Reach out for help from mobile experts - IBM CIO partnered with IBM Global Technology Services 22
  • 23. IBM offers products and services to address the complete mobile lifecycle Connect to backend Build mobile systems applications Assess and Plan Manage mobile devices enterprise mobile and applications strategy Secure your mobile business Transform the business by creating Extend existing business new opportunities capabilities to mobile devices 23
  • 24. By engaging a services provider, leading businesses accelerate value from mobile 2/3 of chief information officers Free IT staff to focus on other business-critical initiatives (CIOs) plan to partner extensively to gain new Leverage additional skill sets skills and expertise as needed 20% Gain in-depth expertise of methodologies and tools productivity gains and cost savings experienced by Have wider range of mobile CIOs who have outsourced activities underway key mobile services Source: The New Workplace CIO Study, IBM Market Insights, October 2011
  • 25. Many IBM clients have already experienced the benefits of a holistic approach to a mobile-enabled enterprise Consolidating a ruggedized Banking on BYOD: mobile device strategy to leveraging secured mobility streamline logistics and services to improve reduced operating costs enterprise application access Transportation Banking North American freight firm European bank implemented improved product delivery, a BYOD program for inventory management and smartphone and tablet logistics support while access to corporate email, cutting costs with ruggedized contacts, calendar, intranet mobile devices. and applications 25
  • 26. For more information IBM mobile enterprise ibm.com/mobile-enterprise IBM mobile services ibm.com/services/mobility IBM mobile software ibm.com/software/solutions/mobile-enterprise/ YouTube videos youtube.com/ibmmobileenterprise @IBMMobile 26
  • 27. For more information – continued IBM CIO video, whitepaper presentation chrispepin.com/2012/11/how-ibm-became-mobile-enterprise.html An integrated approach to managing and securing your mobile environment public.dhe.ibm.com/common/ssi/ecm/en/tis14115usen/TIS14115USEN.PDF IBM mobile frontier blog ibm.com/developerworks/mydeveloperworks/blogs/mobileblog @ChrisPepin 27
  • 28. Legal disclaimer © IBM Corporation 2013. All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. 28 © 2013 IBM Corporation