SlideShare a Scribd company logo
© 2013 IBM Corporation
Securing the Mobile Enterprise
Jude Lancaster
Product Manager
Endpoint Manager for Mobile Devices
1
1
IBM Endpoint Manager Mobile Device management
2
IBM Endpoint Manager Architecture
TEM Server
DB
Console / Web Reports
Relay(s)
Android devices* Apple iOS devices*
Apple Push
Notification
Servers
http / 52311
http / 52311
Management
Extender
Servers, desktops, laptops*
Relay
http / 52311
TCP port 2195 to
gateway.push.apple.com
TCP port 5223 to
*.push.apple.com
* Managing devices that are not connected to the internal network requires opening the management port to the
Internet (HTTP 52311 for Laptops and Android or HTTPS 443 for Apple iOS devices)
BigFix Server
Blackberry*
BES
https / 443
3
3
• Securely enable and accelerate
BYOD mobility
• Mobilize every employee with secure
connectivity to apps and services
• Scale without limits, without
infrastructure costs
Next generation mobility
Mobile meets Cloud
Company
4
DIVIDE OVERVIEW
Company
Dual Persona
• Native user experience
• Secure work container
for iOS & Android
• Extensible to VPN & UC
Business Applications
• Common apps for all
employees
• Third-party apps by
employee group
• External file storage option
Cloud Management
• IT control of the container
• User self-service
• MDM APIs
4
5
5
Ibm endpoint manager + divide
Complete MDM BYOD Solution
Dual Persona
Leverages the sophisticated policies and
features of IBM MDM and Endpoint
Management
Management of Divide as a “virtual device”
including safe, secure distribution and
management of apps
+ +
Immediate solution for BYOD challenges
and security concerns for Mobility OS’s
Seamless delivery: same Divide App,
binding to IBM MDM at time of enrollment
Business AppsIBM Endpoint Manager
6
Architected for reliability
6
No Enterprise Data traverses the Divide Cloud
Management
Traffic
Control
Data
Customer Email Server
What is stored in the Divide cloud?
Device Inventory
Email addresses
Policy settings
DIVIDE MANAGER
Customer Site
DIVIDE
Smart Devices
IBM Endpoint Manager
Company
7
DUAL PERSONA IS FOUNDATIONAL
Separate and Secure Dual Personas
• Data security
• Enterprise apps and services
• Easy to manage and control
• Native user experience
• Choice of device, services
• Freedom and privacy
7
8
“ Lorem ipsum
dolor sit amet,
consectetuer
adipiscing elit.
Integer
pharetra, felis id
volutpatadipisci
ng quam lectus
8
2 U.K.-based
analyst firm Gfk
“When asked why users
are loyal to their
smartphones, 72%
cited ease of use and
the ability to quickly
navigate their phone's
menu.”2
What users want
Choice of native user experience
PERSONAL WORKSPACEENTER
PASSCODE
Tap Divide app icon
Double tap Home button
to access Divide
9
9
• Professional-grade email, contacts, calendar and browser
• Data-at-rest is protected with AES 256 bit
encryption
• Data-in-motion leverages existing VPN
investments
• Secure cloud based file storage (optional)
• Separate voice and messaging
(including future 2-number UC)
• Internally developed apps uploaded and
assigned via policy – in minutes and with
no developer modifications
• Divide App security automatically
provides data-at-rest AES-256 bit
encryption
• Divide Extensions provide extraordinary
integration with 3rd party Apps and Cloud services
GEARED FOR INNOVATION
Leveraging the App Ecosystem
STANDARD DIVIDE APPS THIRD PARTY APPS
10
10
What it organizations need for byod
Divide Container Security
Data Protection
• Device PIN/passcode
• Passcode history and complexity
• Passcode failure actions
• FIPS 140-2 validated encryption
• Full and selective device wipe
• Wipe on SIM removal/rooted
• VPN support
• S/MIME support
OTA Self-Service Provisioning
• ActiveSync email
• VPN configuration
Container Controls
• Whitelisting – application push
• Blacklisting
• Location based services
• Data leakage prevention
• URL blocking
Compliance Management and Reporting
• Device hardware
• Operating system
• Policy compliance
• Compromised device status
• Voice, Data, and SMS usage reporting
11
Extensible for the future
11Company
12
Securing next generation mobility
IBM Endpoint Manager with Divide delivers a comprehensive platform for mobility
12
Unified tracking and
management of
everything a mobile
user needs including
employee owned
devices and
corporate provided
smartphones,
tablets and laptops
A “single pane-of-
glass” to provision
and manage mobile
devices, laptops and
the Divide
workspace in the
easiest way
possible.
Directly connects
the Divide
workspace with IT
apps and services
via the corporate
VPN for complete IT
control.
The Divide
workspace provides
a native user
experience that
users expect and
love and is
extensible to IT
voice and data
services.
Security &
Compliance
Inventory
Tracking
Device
Management
Secure & Reliable
Access Management
User
Experience
A fully integrated
next generation
solution for
mobility that
delivers simplicity
and scale
Limited to mobile
devices with
separate facilities to
track corporate and
employee owned
devices with manual
consolidation of data
A “swivel-chair”
approach with
separate consoles to
manage mobile
devices and the
Good email sandbox
breeds operational
complexity and
requires additional
admin training.
No VPN integration
for personal devices
with all data
traversing the Good
NOC and on-
premise servers,
creating issues of
reliability and scale.
The Good sandbox
delivers a
proprietary “one size
fits all’ user
experience that
users reject and is
email-centric.
An inherently
siloed
approach to
mobility that
inflates costs
and complexity
A single policy
management and
compliance platform
eliminates security
gaps and simplifies
policy administration
and enforcement
Separate facilities
for policy
management and
compliance creates
operational
overhead and error
opportunities
13
The right solution for byod?
13
A first
generation
solution
purpose-built
for email sync
A next
generation
solution
purpose-built
for BYOD
Device
Management
X
✔Manages the
Divide
workspace
and integrates
with IBM
Endpoint
Manager for
device MDM
Does not
integrate with
deployed
MDM
solutions
Secure
“Workspace”
✔
X
Provides a
secure
workspace
that preserves
the native iOS
and Android
user
experience
Provides an
email sandbox
with a
proprietary
user interface
Secure
VPN
✔
X
Provides VPN
connectivity
between the
workspace
and corporate
apps
No VPN
integration -
all data
traverses the
Good NOC
App
Choice
✔
X
App wrapper
technology
enables the
use of any
third party
app within the
workspace
Third-party
apps must be
modified and
recompiled
using the
Good SDK ($)
Avg TCO/
User
$$$$
$$$$
$
14
Questions

More Related Content

What's hot

Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
Lai Yoong Seng
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
olivier lussac
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 

What's hot (20)

Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
BlackBerry Mobile Fusion
BlackBerry Mobile FusionBlackBerry Mobile Fusion
BlackBerry Mobile Fusion
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Designing Mobile Applications
Designing Mobile ApplicationsDesigning Mobile Applications
Designing Mobile Applications
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
CIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity ServicesCIS14: Mobilize Your Workforce with Secure Identity Services
CIS14: Mobilize Your Workforce with Secure Identity Services
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScannerIntroducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Ubiquitous information capture
Ubiquitous information captureUbiquitous information capture
Ubiquitous information capture
 

Viewers also liked (9)

La información ( Gestion Del Conocimiento )
La información ( Gestion Del Conocimiento )La información ( Gestion Del Conocimiento )
La información ( Gestion Del Conocimiento )
 
курить или не курить
курить или не куритькурить или не курить
курить или не курить
 
Evergreen nucleo final
Evergreen nucleo finalEvergreen nucleo final
Evergreen nucleo final
 
Crear una estrategia de Marketing en las Redes Sociales paso a paso
Crear una estrategia de Marketing en las Redes Sociales paso a pasoCrear una estrategia de Marketing en las Redes Sociales paso a paso
Crear una estrategia de Marketing en las Redes Sociales paso a paso
 
The horse meat scandal -merican media presented the situation
The horse meat scandal -merican media presented the situationThe horse meat scandal -merican media presented the situation
The horse meat scandal -merican media presented the situation
 
Culturas de ica
Culturas de icaCulturas de ica
Culturas de ica
 
Ailesbury Clinic Dublin
Ailesbury Clinic Dublin Ailesbury Clinic Dublin
Ailesbury Clinic Dublin
 
Lenda da Batalha de Ourique
Lenda da Batalha de OuriqueLenda da Batalha de Ourique
Lenda da Batalha de Ourique
 
WEB SOCIAL
WEB SOCIAL WEB SOCIAL
WEB SOCIAL
 

Similar to Securing the Mobile enterprise

Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
Pete Valentine
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Nordic Infrastructure Conference
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 

Similar to Securing the Mobile enterprise (20)

IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enterprise Apps Development 101
Enterprise Apps Development 101Enterprise Apps Development 101
Enterprise Apps Development 101
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Living in the Web is Easy! Making the Move from Rich Clients to Browsers
Living in the Web is Easy! Making the Move from Rich Clients to BrowsersLiving in the Web is Easy! Making the Move from Rich Clients to Browsers
Living in the Web is Easy! Making the Move from Rich Clients to Browsers
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 

More from IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
IBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
IBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
IBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
IBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
IBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
IBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
IBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
IBM Danmark
 

More from IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Securing the Mobile enterprise

  • 1. © 2013 IBM Corporation Securing the Mobile Enterprise Jude Lancaster Product Manager Endpoint Manager for Mobile Devices
  • 2. 1 1 IBM Endpoint Manager Mobile Device management
  • 3. 2 IBM Endpoint Manager Architecture TEM Server DB Console / Web Reports Relay(s) Android devices* Apple iOS devices* Apple Push Notification Servers http / 52311 http / 52311 Management Extender Servers, desktops, laptops* Relay http / 52311 TCP port 2195 to gateway.push.apple.com TCP port 5223 to *.push.apple.com * Managing devices that are not connected to the internal network requires opening the management port to the Internet (HTTP 52311 for Laptops and Android or HTTPS 443 for Apple iOS devices) BigFix Server Blackberry* BES https / 443
  • 4. 3 3 • Securely enable and accelerate BYOD mobility • Mobilize every employee with secure connectivity to apps and services • Scale without limits, without infrastructure costs Next generation mobility Mobile meets Cloud Company
  • 5. 4 DIVIDE OVERVIEW Company Dual Persona • Native user experience • Secure work container for iOS & Android • Extensible to VPN & UC Business Applications • Common apps for all employees • Third-party apps by employee group • External file storage option Cloud Management • IT control of the container • User self-service • MDM APIs 4
  • 6. 5 5 Ibm endpoint manager + divide Complete MDM BYOD Solution Dual Persona Leverages the sophisticated policies and features of IBM MDM and Endpoint Management Management of Divide as a “virtual device” including safe, secure distribution and management of apps + + Immediate solution for BYOD challenges and security concerns for Mobility OS’s Seamless delivery: same Divide App, binding to IBM MDM at time of enrollment Business AppsIBM Endpoint Manager
  • 7. 6 Architected for reliability 6 No Enterprise Data traverses the Divide Cloud Management Traffic Control Data Customer Email Server What is stored in the Divide cloud? Device Inventory Email addresses Policy settings DIVIDE MANAGER Customer Site DIVIDE Smart Devices IBM Endpoint Manager Company
  • 8. 7 DUAL PERSONA IS FOUNDATIONAL Separate and Secure Dual Personas • Data security • Enterprise apps and services • Easy to manage and control • Native user experience • Choice of device, services • Freedom and privacy 7
  • 9. 8 “ Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Integer pharetra, felis id volutpatadipisci ng quam lectus 8 2 U.K.-based analyst firm Gfk “When asked why users are loyal to their smartphones, 72% cited ease of use and the ability to quickly navigate their phone's menu.”2 What users want Choice of native user experience PERSONAL WORKSPACEENTER PASSCODE Tap Divide app icon Double tap Home button to access Divide
  • 10. 9 9 • Professional-grade email, contacts, calendar and browser • Data-at-rest is protected with AES 256 bit encryption • Data-in-motion leverages existing VPN investments • Secure cloud based file storage (optional) • Separate voice and messaging (including future 2-number UC) • Internally developed apps uploaded and assigned via policy – in minutes and with no developer modifications • Divide App security automatically provides data-at-rest AES-256 bit encryption • Divide Extensions provide extraordinary integration with 3rd party Apps and Cloud services GEARED FOR INNOVATION Leveraging the App Ecosystem STANDARD DIVIDE APPS THIRD PARTY APPS
  • 11. 10 10 What it organizations need for byod Divide Container Security Data Protection • Device PIN/passcode • Passcode history and complexity • Passcode failure actions • FIPS 140-2 validated encryption • Full and selective device wipe • Wipe on SIM removal/rooted • VPN support • S/MIME support OTA Self-Service Provisioning • ActiveSync email • VPN configuration Container Controls • Whitelisting – application push • Blacklisting • Location based services • Data leakage prevention • URL blocking Compliance Management and Reporting • Device hardware • Operating system • Policy compliance • Compromised device status • Voice, Data, and SMS usage reporting
  • 12. 11 Extensible for the future 11Company
  • 13. 12 Securing next generation mobility IBM Endpoint Manager with Divide delivers a comprehensive platform for mobility 12 Unified tracking and management of everything a mobile user needs including employee owned devices and corporate provided smartphones, tablets and laptops A “single pane-of- glass” to provision and manage mobile devices, laptops and the Divide workspace in the easiest way possible. Directly connects the Divide workspace with IT apps and services via the corporate VPN for complete IT control. The Divide workspace provides a native user experience that users expect and love and is extensible to IT voice and data services. Security & Compliance Inventory Tracking Device Management Secure & Reliable Access Management User Experience A fully integrated next generation solution for mobility that delivers simplicity and scale Limited to mobile devices with separate facilities to track corporate and employee owned devices with manual consolidation of data A “swivel-chair” approach with separate consoles to manage mobile devices and the Good email sandbox breeds operational complexity and requires additional admin training. No VPN integration for personal devices with all data traversing the Good NOC and on- premise servers, creating issues of reliability and scale. The Good sandbox delivers a proprietary “one size fits all’ user experience that users reject and is email-centric. An inherently siloed approach to mobility that inflates costs and complexity A single policy management and compliance platform eliminates security gaps and simplifies policy administration and enforcement Separate facilities for policy management and compliance creates operational overhead and error opportunities
  • 14. 13 The right solution for byod? 13 A first generation solution purpose-built for email sync A next generation solution purpose-built for BYOD Device Management X ✔Manages the Divide workspace and integrates with IBM Endpoint Manager for device MDM Does not integrate with deployed MDM solutions Secure “Workspace” ✔ X Provides a secure workspace that preserves the native iOS and Android user experience Provides an email sandbox with a proprietary user interface Secure VPN ✔ X Provides VPN connectivity between the workspace and corporate apps No VPN integration - all data traverses the Good NOC App Choice ✔ X App wrapper technology enables the use of any third party app within the workspace Third-party apps must be modified and recompiled using the Good SDK ($) Avg TCO/ User $$$$ $$$$ $