SlideShare a Scribd company logo
© 2015 IBM Corporation
A Guide to Secure Mobility in the Enterprise
Chuck Brown
Product Management
IBM Security
Windows 10
Jimmy Tsang
Product Marketing
IBM Security
2© 2016 IBM Corporation
Housekeeping items
ü Duration – 60 minutes
ü Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
ü Recording and slides will be
emailed to you
3© 2016 IBM Corporation
Agenda
ü Windows overview & trends
ü Windows 10 highlights
ü MaaS360 support for Windows 10
ü Demo
ü Q&A
4© 2016 IBM Corporation
Poll results from May 2015
9%
85%
4%
2%
0%
Windows 8
Windows 7
Windows XP
Mac OS X
Other
0% 20% 40% 60% 80% 100%
What operating system is installed on
most of your laptops and desktops?
5© 2016 IBM Corporation
Microsoft OS ecosystem
6© 2016 IBM Corporation
Convergence of Windows
7© 2016 IBM Corporation
Windows 10
8© 2016 IBM Corporation
Current State of Affairs
§ Windows 10 generally available on July 29, 2015
§ “Free” upgrades to majority of devices except for Enterprise users
§ First 24 hours – 14 million installs
– At peak - Windows 10 was being installed on about 1500 machines per second
§ Adoption is accelerating: >40% of new Win10 devices since Black Friday
§ Microsoft expects 1 billion devices to be running Windows 10 in 3 years
14
110
200
0
50
100
150
200
250
Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15
Millions
Windows 10 Installs
9© 2016 IBM Corporation
Windows 10 Migration
§ Shifting in Week 5
§ Previous – moves
from W8/8.1
– W8/8.1 has
highest
dissatisfaction
among users
§ Now migrating
more from
Windows 7
http://www.networkworld.com/article/2985121/windows/windows-10-begins-to-eat-into-windows-7s-usage-
share.html?phint=newt%3Dnetworkworld_daily_news_alert&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242#tk.NWWNLE_nlt_daily_am_2015-09-
22&siteid=&phint=tpcs%3D&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242
10© 2016 IBM Corporation
Laptop and Desktop OS Market Share
NetMarketShare.com
§ Windows operating systems constitute ~ 91% of the total market share
§ Current Windows 10 market share is 9.96%
§ At 10% growth rate month on month – 20.81% market share by 2016 Q3
NetMarketShare.com
Windows 7
58%
Windows
XP
16%
Windows 8
15%
OS X
6%
Other
3%
Windows
Vista
2%
April 2015
Windows 7
56%
Windows
XP
11%
Windows 8
13%
OS X
7%
Other
2%
Windows
Vista
1% Windows 10
10%
December 2015
11© 2016 IBM Corporation
§ Microsoft has an API set across Windows 10 PC/Tablet and Mobile
– API set is an extension to Windows Phone 8.1
– No API sets on Windows 7
§ Mac OS X provides a set of management APIs similar to iOS.
– Apple is working on convergence of management API sets
Device and OS are Creating a Continuum
Code for one.
Reach them all.
12© 2016 IBM Corporation
Where Are We?
13© 2016 IBM Corporation
Configuration Service Provider Reference
§ Up-to-date list of API features for
Windows 10
§ https://msdn.microsoft.com/en-
us/library/windows/hardware/dn92002
5%28v=vs.85%29.aspx
14© 2016 IBM Corporation
7 Reasons to Open Up Windows 10
§ Convergence of Windows (Continuum)
§ Similar API set and policies on all devices
§ Build once use anywhere (Universal Apps)
§ Greater data and program security
§ Enlightened applications – Application management
§ Consistent workflow
§ Spartan/Edge browser
© 2015 IBM Corporation
Windows 10 Policies
16© 2016 IBM Corporation
Security Policies
17© 2016 IBM Corporation
Device Restrictions
18© 2016 IBM Corporation
Network Restrictions
19© 2016 IBM Corporation
Configure Trusted Certificates
20© 2016 IBM Corporation
ActiveSync Settings
© 2015 IBM Corporation
Windows 10 Actions
22© 2016 IBM Corporation
Windows 10 Actions
§ Locate
§ Selective Wipe
§ Wipe
§ Change Policy
* Support for real-time notifications for these actions
§ Remove Control
§ Hide
§ Request Data Refresh
© 2015 IBM Corporation
Additional Security Options
24© 2016 IBM Corporation
Enterprise Data Protection – The Device is the BIG Container
§ Encrypt enterprise data on employee- and corporate-owned devices
§ Remotely wipe enterprise data off managed devices w/o affecting
personal data
§ Privileged Apps
– Select specific apps that can access data
– Block non-privileged apps from accessing data
§ Employees not interrupted while switching between personal and
enterprise apps while security policies are in place.
§ AppLocker
– The AppLocker configuration service provider is used to specify which
applications are allowed or disallowed for enterprise data protection
https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx
25© 2016 IBM Corporation
Additional Security Options
§ BitLocker for Full Disk Encryption
– New Features
• Encrypt and recover your device with Azure Active Directory.
• DMA port protection. You can use
the DataProtection/AllowDirectMemoryAccess MDM policy to block DMA
ports when the device is starting up.
• New Group Policy for configuring pre-boot recovery.
§ Windows Defender included with the OS
– Anti-virus & Anti-malware
• Auto updates
• Have not receive glowing reviews – “Just good enough” ?
§ Backup & Recovery
– Native integration with OneDrive
26© 2016 IBM Corporation
Assigned Access – Kiosk Mode – Device Lockdown
§ Use Cases
– Device in the lobby that customers can use to view your product catalog
– Portable device that drivers can use to check a route on a map
– Device that a temporary worker uses to enter data
§ Configure a persistent locked down state to create a kiosk-type device.
When the locked-down account is logged on, the device displays only the
app that you select.
§ Configure a lockdown state that
takes effect when a given user
account logs on. The lockdown
restricts the user to only the apps
that you specify.
§ Lockdown settings can also be
configured for device look and feel,
such as a theme or a custom
layout on the Start screen
27© 2016 IBM Corporation
Edge Browser
§ Stops phishers before they cast their bait
– Edge aims to prevent phishing attacks through its Passport technology
– Instead of using a shareable password, Edge will authenticate securely to
applications, including websites and networks
§ Operates in a sandbox
– Internet Explorer was the browser was built directly into Windows
– If the browser was compromised,
your entire computer might be taken
down along with it
– Edge, on the other hand, will be a
universal app, constantly running
in a partial sandbox
§ Deactivates extensions, such as
ActiveX & VB
© 2015 IBM Corporation
Patching
29© 2016 IBM Corporation
Security Patching
§ Security patching is mandatory for all versions except Enterprise
– Management
– Automatic download and installation when device is connect to internet
– Peer to Peer sharing of patch distribution inside the LAN
– Updates/patches/fixes can be granularly controlled on the Enterprise edition
(have not seen that yet)
§ Patching Bundles
– Multiple line items (bulletins) now bundled into one package
• Do not have the ability to test each item
• http://www.computerworld.com/article/2969850/microsoft-windows/patch-bundles-are-
the-new-norm-for-windows-10.html
§ OS Upgrades
– 2 speeds – Fast and Slow ring
© 2015 IBM Corporation
Applications & Software
Distribution
31© 2016 IBM Corporation
Universal Applications, Store and Software Distribution
§ Build once – install on all devices
§ Multiple types of applications
– Win32 – “legacy” type of application
– APPX, App-V
§ Business Store for Applications
– Acquire and Distribute Applications
– Bulk Acquisition of Apps (Free and Paid)
– Application Management – reclaim/re-use licenses
– Similarities to iTunes App Store
§ Software Catalogs
– Need to have a self-directed app catalog, like iOS/Android
32© 2016 IBM Corporation
Third Party Software Distribution
§ Standard third party Windows software
– Google (Chrome), Adobe, Java
– Many have msi and APPX versions
– Updates still necessary
© 2015 IBM Corporation
Windows 10 Enrollment
34© 2016 IBM Corporation
Starting the Enrollment
§ Same standard process in MaaS360 for over-the-air enrollment
§ Enroll a device – receive the request
35© 2016 IBM Corporation
MDM Enrollment
§ Installing the Company Hub
§ Click Continue
36© 2016 IBM Corporation
MDM Enrollment
§ Enrolled successfully
§ Click Done
37© 2016 IBM Corporation
Poll Results from May 2015
5%
22%
22%
35%
17%
Within 6 months
6-12 months
12-18 months
18 months or longer
We don’t plan to upgrade to
Windows 10
0% 5% 10% 15% 20% 25% 30% 35% 40%
Based on what your organization knows today,
when does it plan to upgrade to Windows 10?
© 2015 IBM Corporation
Demo
39© 2016 IBM Corporation
Customer Value
§ Greatly simplifies workflows
§ Support all devices from one window
§ Actionable intelligence on or off network
§ Upgrades and new features/functions made available without end-user
installations
§ Silent service
– Does not disturb the productivity of the end user
40© 2016 IBM Corporation
Why Should I Care?
§ Consistent unified workflow and information across all device platforms
§ No on-site infrastructure needed to support laptops, desktops, tablets and
smartphones
§ Easy and fast to turn on
§ No heavy lifting for upgrades
41© 2016 IBM Corporation
Complete Mobility Management and Security
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
42© 2016 IBM Corporation
Seamless Enterprise Integration
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
BYOD
Corporate
Shared
Mail systems
Directories
Certificates
File shares
43© 2016 IBM Corporation
Platform for Strong Mobile Security
Mobile Threat
Management
Risk & Event
Detection
Unified Endpoint
Management
Mobile Identity
Management
Integrated
App Security
App
Vulnerability &
Reputation
Automated Policy Compliance
Encryption & Data Protection
Authentication & Restrictions
Containerization & App VPN
Device Quarantine & Wipe
44© 2016 IBM Corporation
Why IBM MaaS360?
Integrated
solutions that connect
seamlessly to your
existing and external
environments
Scalable
data security with
intelligence for the
volume, speed, and
variability of mobile
Complete
management of
devices, apps, content
and users from a
single platform
45© 2016 IBM Corporation
Get Started Right Now
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices, apps
and content
Easy
Set up and
configure your
service in minutes
1
2 3
Click here
http://trymaas360.agilly.net
And enjoy your 30 days free trial
46© 2016 IBM Corporation
Une	division	de	
www.agilly.net
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security

More Related Content

What's hot

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
Ali Mkahal
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteRonny de Jong
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
Jeannette Browning
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Jan Ketil Skanke
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the Covers
Microsoft Education AU
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD world
Microsoft Education AU
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Microsoft Education AU
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
Abhishek Sood
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
Microsoft Education AU
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
David J Rosenthal
 
September 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know WebinarSeptember 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know Webinar
Robert Crane
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
Nuno Alves
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
Robert Crane
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
Microsoft Education AU
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
David J Rosenthal
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"
iGlobe
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
Robert Crane
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanDavid J Rosenthal
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next levelRonny de Jong
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
Robert Crane
 

What's hot (20)

Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
Windows 10 and EMS better together @ Windows 10 Partner Technical Bootcamp Mi...
 
Next Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the CoversNext Level Learning IT Track - Office 365, Under the Covers
Next Level Learning IT Track - Office 365, Under the Covers
 
Next Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD worldNext Level Learning IT Track - Managing Devices in a BYOD world
Next Level Learning IT Track - Managing Devices in a BYOD world
 
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in EducationNext Level Learning IT Track - Journey to the Cloud with Azure in Education
Next Level Learning IT Track - Journey to the Cloud with Azure in Education
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10Next Level Learning IT Track - Windows 10
Next Level Learning IT Track - Windows 10
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
September 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know WebinarSeptember 2021 Microsoft 365 Need to Know Webinar
September 2021 Microsoft 365 Need to Know Webinar
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Next Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud TrustNext Level Learning IT Track 6 - Cloud Trust
Next Level Learning IT Track 6 - Cloud Trust
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
 
Taking conditional access to the next level
Taking conditional access to the next levelTaking conditional access to the next level
Taking conditional access to the next level
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 

Similar to Windows 10 A Guide to Secure Mobility in the Enterprise

7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
AGILLY
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
Flexera
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Alexander Benoit
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
Ajay Chebbi
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
Olav Tvedt
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
AGILLY
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
eG Innovations
 
Splashtop Business Access Datasheet
Splashtop Business Access DatasheetSplashtop Business Access Datasheet
Splashtop Business Access Datasheet
Splashtop Inc
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerGeorge Kanellopoulos
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
Stephen Rose
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformation
moldovaictsummit2016
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITProceed
 
MMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_FinalMMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_Final
mentvanderplas
 
Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
Microsoft TechNet - Belgium and Luxembourg
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Rogue Wave Software
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
Jeremy Siewert
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in Action
IBM Danmark
 
A301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoringA301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoring
Michael Dawson
 

Similar to Windows 10 A Guide to Secure Mobility in the Enterprise (20)

7 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 107 Bonnes Raisons de vous ouvrir à Windows 10
7 Bonnes Raisons de vous ouvrir à Windows 10
 
Windows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring AdaptivaWindows 10 Rapid Release Management - Featuring Adaptiva
Windows 10 Rapid Release Management - Featuring Adaptiva
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
 
Splashtop Business Access Datasheet
Splashtop Business Access DatasheetSplashtop Business Access Datasheet
Splashtop Business Access Datasheet
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2James Jara Portfolio 2014  - Cloud Operating System Voip -Part 2
James Jara Portfolio 2014 - Cloud Operating System Voip -Part 2
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform Installer
 
Everything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application CompatibilityEverything You Ever Wanted To Know About Application Compatibility
Everything You Ever Wanted To Know About Application Compatibility
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformation
 
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterpriseITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
ITPROCEED_WorkplaceMobility_Windows 10 in the enterprise
 
MMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_FinalMMS2011_BC34_Plas_Final
MMS2011_BC34_Plas_Final
 
Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Five ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecksFive ways to protect your software supply chain from hacks, quacks, and wrecks
Five ways to protect your software supply chain from hacks, quacks, and wrecks
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Nordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in ActionNordics IBM Mobile Foundation Integration in Action
Nordics IBM Mobile Foundation Integration in Action
 
A301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoringA301 ctu madrid2016-monitoring
A301 ctu madrid2016-monitoring
 

More from Gerard Konan

AGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptxAGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptx
Gerard Konan
 
AGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptxAGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptx
Gerard Konan
 
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptxUtilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Gerard Konan
 
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connectéUtilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
Gerard Konan
 
Cyber mois 2021 comment eviter les cyber risques pour les pme
Cyber mois 2021   comment eviter les cyber risques pour les pmeCyber mois 2021   comment eviter les cyber risques pour les pme
Cyber mois 2021 comment eviter les cyber risques pour les pme
Gerard Konan
 
Protection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne finalProtection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne final
Gerard Konan
 
Préserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du DigitalPréserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du Digital
Gerard Konan
 
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes PratiquesFAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
Gerard Konan
 
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des LieuxFAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
Gerard Konan
 
Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017
Gerard Konan
 
Introduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaSIntroduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaS
Gerard Konan
 
Le cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entrepriseLe cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entreprise
Gerard Konan
 
Une Présentation sur l'Effectuation
Une Présentation sur l'EffectuationUne Présentation sur l'Effectuation
Une Présentation sur l'Effectuation
Gerard Konan
 
Gestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de SolutionsGestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de Solutions
Gerard Konan
 
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYODIBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
Gerard Konan
 

More from Gerard Konan (15)

AGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptxAGILLY Securité du Cloud.pptx
AGILLY Securité du Cloud.pptx
 
AGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptxAGILLY - Introdution au Cloud Computing.pptx
AGILLY - Introdution au Cloud Computing.pptx
 
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptxUtilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
Utilisation Sécuritaire et Responsable d'Internet dans un monde connecté.pptx
 
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connectéUtilisation Securitaire et Responsable d'Internet dans un monde connecté
Utilisation Securitaire et Responsable d'Internet dans un monde connecté
 
Cyber mois 2021 comment eviter les cyber risques pour les pme
Cyber mois 2021   comment eviter les cyber risques pour les pmeCyber mois 2021   comment eviter les cyber risques pour les pme
Cyber mois 2021 comment eviter les cyber risques pour les pme
 
Protection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne finalProtection des enfants et de la famille en ligne final
Protection des enfants et de la famille en ligne final
 
Préserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du DigitalPréserver les Liens Familiaux à l'ère du Digital
Préserver les Liens Familiaux à l'ère du Digital
 
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes PratiquesFAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
FAPBEF-UEMOA Transformation Digitale des Banques Bonnes Pratiques
 
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des LieuxFAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
FAPBEF UEMOA Banque Digitale dans l'espace UEMOA Etat des Lieux
 
Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017Introduction à Cloud Foundry Journée du Code 2017
Introduction à Cloud Foundry Journée du Code 2017
 
Introduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaSIntroduction à Cloud Foundry et au PaaS
Introduction à Cloud Foundry et au PaaS
 
Le cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entrepriseLe cloud, moteur de croissance de l'entreprise
Le cloud, moteur de croissance de l'entreprise
 
Une Présentation sur l'Effectuation
Une Présentation sur l'EffectuationUne Présentation sur l'Effectuation
Une Présentation sur l'Effectuation
 
Gestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de SolutionsGestion du Cycle de Vente d'Affaire ou de Solutions
Gestion du Cycle de Vente d'Affaire ou de Solutions
 
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYODIBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
IBM MaaS360 : Maîtriser les Risques liée à la Mobilité et au BYOD
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 

Windows 10 A Guide to Secure Mobility in the Enterprise

  • 1. © 2015 IBM Corporation A Guide to Secure Mobility in the Enterprise Chuck Brown Product Management IBM Security Windows 10 Jimmy Tsang Product Marketing IBM Security
  • 2. 2© 2016 IBM Corporation Housekeeping items ü Duration – 60 minutes ü Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen ü Recording and slides will be emailed to you
  • 3. 3© 2016 IBM Corporation Agenda ü Windows overview & trends ü Windows 10 highlights ü MaaS360 support for Windows 10 ü Demo ü Q&A
  • 4. 4© 2016 IBM Corporation Poll results from May 2015 9% 85% 4% 2% 0% Windows 8 Windows 7 Windows XP Mac OS X Other 0% 20% 40% 60% 80% 100% What operating system is installed on most of your laptops and desktops?
  • 5. 5© 2016 IBM Corporation Microsoft OS ecosystem
  • 6. 6© 2016 IBM Corporation Convergence of Windows
  • 7. 7© 2016 IBM Corporation Windows 10
  • 8. 8© 2016 IBM Corporation Current State of Affairs § Windows 10 generally available on July 29, 2015 § “Free” upgrades to majority of devices except for Enterprise users § First 24 hours – 14 million installs – At peak - Windows 10 was being installed on about 1500 machines per second § Adoption is accelerating: >40% of new Win10 devices since Black Friday § Microsoft expects 1 billion devices to be running Windows 10 in 3 years 14 110 200 0 50 100 150 200 250 Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15 Millions Windows 10 Installs
  • 9. 9© 2016 IBM Corporation Windows 10 Migration § Shifting in Week 5 § Previous – moves from W8/8.1 – W8/8.1 has highest dissatisfaction among users § Now migrating more from Windows 7 http://www.networkworld.com/article/2985121/windows/windows-10-begins-to-eat-into-windows-7s-usage- share.html?phint=newt%3Dnetworkworld_daily_news_alert&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242#tk.NWWNLE_nlt_daily_am_2015-09- 22&siteid=&phint=tpcs%3D&phint=idg_eid%3D9d62e138c25290651cbb2506bb69e242
  • 10. 10© 2016 IBM Corporation Laptop and Desktop OS Market Share NetMarketShare.com § Windows operating systems constitute ~ 91% of the total market share § Current Windows 10 market share is 9.96% § At 10% growth rate month on month – 20.81% market share by 2016 Q3 NetMarketShare.com Windows 7 58% Windows XP 16% Windows 8 15% OS X 6% Other 3% Windows Vista 2% April 2015 Windows 7 56% Windows XP 11% Windows 8 13% OS X 7% Other 2% Windows Vista 1% Windows 10 10% December 2015
  • 11. 11© 2016 IBM Corporation § Microsoft has an API set across Windows 10 PC/Tablet and Mobile – API set is an extension to Windows Phone 8.1 – No API sets on Windows 7 § Mac OS X provides a set of management APIs similar to iOS. – Apple is working on convergence of management API sets Device and OS are Creating a Continuum Code for one. Reach them all.
  • 12. 12© 2016 IBM Corporation Where Are We?
  • 13. 13© 2016 IBM Corporation Configuration Service Provider Reference § Up-to-date list of API features for Windows 10 § https://msdn.microsoft.com/en- us/library/windows/hardware/dn92002 5%28v=vs.85%29.aspx
  • 14. 14© 2016 IBM Corporation 7 Reasons to Open Up Windows 10 § Convergence of Windows (Continuum) § Similar API set and policies on all devices § Build once use anywhere (Universal Apps) § Greater data and program security § Enlightened applications – Application management § Consistent workflow § Spartan/Edge browser
  • 15. © 2015 IBM Corporation Windows 10 Policies
  • 16. 16© 2016 IBM Corporation Security Policies
  • 17. 17© 2016 IBM Corporation Device Restrictions
  • 18. 18© 2016 IBM Corporation Network Restrictions
  • 19. 19© 2016 IBM Corporation Configure Trusted Certificates
  • 20. 20© 2016 IBM Corporation ActiveSync Settings
  • 21. © 2015 IBM Corporation Windows 10 Actions
  • 22. 22© 2016 IBM Corporation Windows 10 Actions § Locate § Selective Wipe § Wipe § Change Policy * Support for real-time notifications for these actions § Remove Control § Hide § Request Data Refresh
  • 23. © 2015 IBM Corporation Additional Security Options
  • 24. 24© 2016 IBM Corporation Enterprise Data Protection – The Device is the BIG Container § Encrypt enterprise data on employee- and corporate-owned devices § Remotely wipe enterprise data off managed devices w/o affecting personal data § Privileged Apps – Select specific apps that can access data – Block non-privileged apps from accessing data § Employees not interrupted while switching between personal and enterprise apps while security policies are in place. § AppLocker – The AppLocker configuration service provider is used to specify which applications are allowed or disallowed for enterprise data protection https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx
  • 25. 25© 2016 IBM Corporation Additional Security Options § BitLocker for Full Disk Encryption – New Features • Encrypt and recover your device with Azure Active Directory. • DMA port protection. You can use the DataProtection/AllowDirectMemoryAccess MDM policy to block DMA ports when the device is starting up. • New Group Policy for configuring pre-boot recovery. § Windows Defender included with the OS – Anti-virus & Anti-malware • Auto updates • Have not receive glowing reviews – “Just good enough” ? § Backup & Recovery – Native integration with OneDrive
  • 26. 26© 2016 IBM Corporation Assigned Access – Kiosk Mode – Device Lockdown § Use Cases – Device in the lobby that customers can use to view your product catalog – Portable device that drivers can use to check a route on a map – Device that a temporary worker uses to enter data § Configure a persistent locked down state to create a kiosk-type device. When the locked-down account is logged on, the device displays only the app that you select. § Configure a lockdown state that takes effect when a given user account logs on. The lockdown restricts the user to only the apps that you specify. § Lockdown settings can also be configured for device look and feel, such as a theme or a custom layout on the Start screen
  • 27. 27© 2016 IBM Corporation Edge Browser § Stops phishers before they cast their bait – Edge aims to prevent phishing attacks through its Passport technology – Instead of using a shareable password, Edge will authenticate securely to applications, including websites and networks § Operates in a sandbox – Internet Explorer was the browser was built directly into Windows – If the browser was compromised, your entire computer might be taken down along with it – Edge, on the other hand, will be a universal app, constantly running in a partial sandbox § Deactivates extensions, such as ActiveX & VB
  • 28. © 2015 IBM Corporation Patching
  • 29. 29© 2016 IBM Corporation Security Patching § Security patching is mandatory for all versions except Enterprise – Management – Automatic download and installation when device is connect to internet – Peer to Peer sharing of patch distribution inside the LAN – Updates/patches/fixes can be granularly controlled on the Enterprise edition (have not seen that yet) § Patching Bundles – Multiple line items (bulletins) now bundled into one package • Do not have the ability to test each item • http://www.computerworld.com/article/2969850/microsoft-windows/patch-bundles-are- the-new-norm-for-windows-10.html § OS Upgrades – 2 speeds – Fast and Slow ring
  • 30. © 2015 IBM Corporation Applications & Software Distribution
  • 31. 31© 2016 IBM Corporation Universal Applications, Store and Software Distribution § Build once – install on all devices § Multiple types of applications – Win32 – “legacy” type of application – APPX, App-V § Business Store for Applications – Acquire and Distribute Applications – Bulk Acquisition of Apps (Free and Paid) – Application Management – reclaim/re-use licenses – Similarities to iTunes App Store § Software Catalogs – Need to have a self-directed app catalog, like iOS/Android
  • 32. 32© 2016 IBM Corporation Third Party Software Distribution § Standard third party Windows software – Google (Chrome), Adobe, Java – Many have msi and APPX versions – Updates still necessary
  • 33. © 2015 IBM Corporation Windows 10 Enrollment
  • 34. 34© 2016 IBM Corporation Starting the Enrollment § Same standard process in MaaS360 for over-the-air enrollment § Enroll a device – receive the request
  • 35. 35© 2016 IBM Corporation MDM Enrollment § Installing the Company Hub § Click Continue
  • 36. 36© 2016 IBM Corporation MDM Enrollment § Enrolled successfully § Click Done
  • 37. 37© 2016 IBM Corporation Poll Results from May 2015 5% 22% 22% 35% 17% Within 6 months 6-12 months 12-18 months 18 months or longer We don’t plan to upgrade to Windows 10 0% 5% 10% 15% 20% 25% 30% 35% 40% Based on what your organization knows today, when does it plan to upgrade to Windows 10?
  • 38. © 2015 IBM Corporation Demo
  • 39. 39© 2016 IBM Corporation Customer Value § Greatly simplifies workflows § Support all devices from one window § Actionable intelligence on or off network § Upgrades and new features/functions made available without end-user installations § Silent service – Does not disturb the productivity of the end user
  • 40. 40© 2016 IBM Corporation Why Should I Care? § Consistent unified workflow and information across all device platforms § No on-site infrastructure needed to support laptops, desktops, tablets and smartphones § Easy and fast to turn on § No heavy lifting for upgrades
  • 41. 41© 2016 IBM Corporation Complete Mobility Management and Security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access
  • 42. 42© 2016 IBM Corporation Seamless Enterprise Integration Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access BYOD Corporate Shared Mail systems Directories Certificates File shares
  • 43. 43© 2016 IBM Corporation Platform for Strong Mobile Security Mobile Threat Management Risk & Event Detection Unified Endpoint Management Mobile Identity Management Integrated App Security App Vulnerability & Reputation Automated Policy Compliance Encryption & Data Protection Authentication & Restrictions Containerization & App VPN Device Quarantine & Wipe
  • 44. 44© 2016 IBM Corporation Why IBM MaaS360? Integrated solutions that connect seamlessly to your existing and external environments Scalable data security with intelligence for the volume, speed, and variability of mobile Complete management of devices, apps, content and users from a single platform
  • 45. 45© 2016 IBM Corporation Get Started Right Now Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, apps and content Easy Set up and configure your service in minutes 1 2 3 Click here http://trymaas360.agilly.net And enjoy your 30 days free trial
  • 46. 46© 2016 IBM Corporation Une division de www.agilly.net
  • 47. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security