SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Best practices for mobile enterprise security

Chris Pepin
IBM Global Mobile Offering Manager and Evangelist




                                                    © 2012 IBM Corporation
Mobile is a milestone in the evolution of computing
                                                    Mobile
                                                    & cloud

                                          Web


                 Client
                 server                         @


Mainframe




Source: IBM press release November 2012

2                                                             © 2012 IBM Corporation
Enterprise are faced with multiple mobile challenges



                                  “Consumerization of IT” forcing chief information officers s to have
     Business                      “bring-your-own-device” (BYOD) policy and plan; provide employee–device choice
        and
                                  Anytime, anywhere, any device access now standard
     IT change
                                  Social business interactions are increasingly important


                                  Protection of privacy and confidential information
    Security and                  Policies for client-owned smartphones and tablets
    management
                                  Visibility, security and management of mobile platform requirements


                                  Complexity of multiple device platforms

      Lifecycle                   Unique mobile requirements for employees/workers
     complexity                   Extending data, voice and video applications to mobile devices
                                  Integrating across wired or wireless local area network (LAN) platforms


Source: The New Workplace Chief Information Officer (CIO) Study, IBM Market Insights, October 2011
Review the Flexible Workplace Sellers Assets (Client Presentation, Discussion Guide, and More)
3                                                                                                            © 2012 IBM Corporation
Mobile security is top of mind for today’s CIO’s



                             Advanced mobile security                    76%

                             Application virtualization                  67%

                             Enterprise mobile strategy                  66%

                             Multi-device mobile access                  66%

                             Tablets to augment PCs                      64%

                             Unified communications                      58%




Source: The New Workplace CIO Study, IBM Market Insights, October 2011


4                                                                              © 2012 IBM Corporation
There are multiple mobile security risks to address



 Loss and theft                                                        Malware
                                                                                             In 2011, mobile              Google Android
                                                                                             device users saw             malware grew

                                                                                             155%                         400%
                                                                                             increase in malware          from June 2010 to
1 in 20 mobile devices were stolen                                                           across all platforms.1   .   January 2011.1
in 2010.1


 Spam                                                                  Wi-Fi
                                                                       Wi-Fi hotspot are set to increase

                                                                       350% by 2015
                                                                       provided more opportunities for
                                                                       “man-in-the-middle” attacks.1


70% of mobile device spam
is fraudulent financial services.2
¹Juniper Networks Malicious Mobile Threats Report 2010/2011, May 2011
²GSMA Outlines Findings from Spam Reporting Service Pilot press release, February 10, 2011
5                                                                                                                               © 2012 IBM Corporation
Mobile security involves strategy, policy, education and technology




                               Strategy



                  Education                Policy



                              Technology



6                                                           © 2012 IBM Corporation
The mobile enterprise starts with defining a strategy



 Defining the business problem

 Personas and use cases

 Mobile applications

                                                      Strategy
 Success criteria




         Enterprises need at least two strategies: B2E and B2C
7                                                                © 2012 IBM Corporation
Written corporate mobile policy is essential



 Terms and conditions
    What devices, OS’s and apps are supported
    Passcode, device wipe, allowed applications

 Corporate owned devices

                                                    Policy
 BYOD and data privacy

 Human resources, legal, procurement and
  reimbursement




    A comprehensive policy for PCs, smartphones and tablets is recommended
8                                                               © 2012 IBM Corporation
Technology implements, monitors and enforces corporate policy



 Endpoint management

 Encryption

 Containerization

 Network access                                   Technology

 Anti-malware

 Authentication




          Solutions that support multiple endpoints are recommended
9                                                               © 2012 IBM Corporation
It’s all about the apps!



 Native, web, hybrid, virtual

 Out of the box applications
    Email, contacts, calendar, file sharing, etc.

 Custom applications
    Native SDK                                               Technology
    Mobile Application Platform
    Containerization and application wrapping

 Application management and marketplace




                                   One size doesn’t fit all
10                                                                         © 2012 IBM Corporation
Employees are the weakest link and education is essential



 Identifying cybersecurity threats

 Protecting corporate and client data

 Safeguarding devices

 Data and security incident reporting            Education
 Build a “culture of security”




Published guidelines, online education and social interaction is recommended
11                                                              © 2012 IBM Corporation
IBM CIO has embraced mobile

                                                           IBM's BYOD program "really
     435,000 employees worldwide                          is about supporting
                                                           employees in the way they
                                                           want to work. They will find
                                                           the most appropriate tool to
                                                           get their job done. I want to
     50% of employees work remotely                       make sure I can enable them
                                                           to do that, but in a way that
                                                           safeguards the integrity of our
                                                           business.“
     50% workforce have less than 5 years of service
                                                           - IBM CIO Jeanette Horan



     How did IBM address the challenge?                 Business outcomes
      1.   Deploy a secure technology framework          Increased employee productivity
                                                         Increased employee satisfaction
      2.   Develop a strong usage policy
                                                         Reduced security risk and loss of corporate data
      3.   Educate employees                              for personally owned devices
                                                         Over 120,000 employees using mobile devices for
      4.   Support personally owned devices               business with over 80,000 BYOD
           through social software


12                                                                                            © 2012 IBM Corporation
1
IBM offers products and services to address the complete mobile
lifecycle


                                          Connect to backend systems
                           Build mobile   in support of mobile
                           applications


       Assess and Plan                                 Manage mobile devices
       enterprise mobile                               and applications
       strategy


                                                        Secure your
                                                        mobile business

                   Transform the
              business by creating         Extend existing business
                new opportunities          capabilities to mobile devices




13
13                                                                          © 2012 IBM Corporation
By engaging a services provider, leading businesses accelerate
value from mobile while positioning for long-term success.


                                                                         Benefits resulting from outsourcing

2/3
of chief information officers
                                                                                Free IT staff to focus on other
                                                                                business-critical initiatives
(CIOs) plan to partner
extensively to gain new
skills and expertise
                                                                                 Leverage additional skill sets
                                                                                 as needed


20%
productivity gains and cost
                                                                                Gain in-depth expertise of
                                                                                methodologies and tools
savings experienced by
CIOs who have outsourced
key mobile services
                                                                                Have wider range of mobile
                                                                                activities underway

Source: The New Workplace CIO Study, IBM Market Insights, October 2011
14                                                                                                      © 2012 IBM Corporation
For more information

IBM mobile services
ibm.com/services/mobility

IBM mobile software
ibm.com/software/solutions/mobile-enterprise/

YouTube videos
youtube.com/ibmmobileenterprise




            Follow us on Twitter! @IBMMobile



15                                              © 2012 IBM Corporation
Questions?




16                © 2012 IBM Corporation
17   © 2012 IBM Corporation

Weitere ähnliche Inhalte

Mehr von Chris Pepin

#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMChris Pepin
 

Mehr von Chris Pepin (19)

#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
 

Kürzlich hochgeladen

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Best practices for mobile enterprise security

  • 1. Best practices for mobile enterprise security Chris Pepin IBM Global Mobile Offering Manager and Evangelist © 2012 IBM Corporation
  • 2. Mobile is a milestone in the evolution of computing Mobile & cloud Web Client server @ Mainframe Source: IBM press release November 2012 2 © 2012 IBM Corporation
  • 3. Enterprise are faced with multiple mobile challenges  “Consumerization of IT” forcing chief information officers s to have Business “bring-your-own-device” (BYOD) policy and plan; provide employee–device choice and  Anytime, anywhere, any device access now standard IT change  Social business interactions are increasingly important  Protection of privacy and confidential information Security and  Policies for client-owned smartphones and tablets management  Visibility, security and management of mobile platform requirements  Complexity of multiple device platforms Lifecycle  Unique mobile requirements for employees/workers complexity  Extending data, voice and video applications to mobile devices  Integrating across wired or wireless local area network (LAN) platforms Source: The New Workplace Chief Information Officer (CIO) Study, IBM Market Insights, October 2011 Review the Flexible Workplace Sellers Assets (Client Presentation, Discussion Guide, and More) 3 © 2012 IBM Corporation
  • 4. Mobile security is top of mind for today’s CIO’s Advanced mobile security 76% Application virtualization 67% Enterprise mobile strategy 66% Multi-device mobile access 66% Tablets to augment PCs 64% Unified communications 58% Source: The New Workplace CIO Study, IBM Market Insights, October 2011 4 © 2012 IBM Corporation
  • 5. There are multiple mobile security risks to address Loss and theft Malware In 2011, mobile Google Android device users saw malware grew 155% 400% increase in malware from June 2010 to 1 in 20 mobile devices were stolen across all platforms.1 . January 2011.1 in 2010.1 Spam Wi-Fi Wi-Fi hotspot are set to increase 350% by 2015 provided more opportunities for “man-in-the-middle” attacks.1 70% of mobile device spam is fraudulent financial services.2 ¹Juniper Networks Malicious Mobile Threats Report 2010/2011, May 2011 ²GSMA Outlines Findings from Spam Reporting Service Pilot press release, February 10, 2011 5 © 2012 IBM Corporation
  • 6. Mobile security involves strategy, policy, education and technology Strategy Education Policy Technology 6 © 2012 IBM Corporation
  • 7. The mobile enterprise starts with defining a strategy  Defining the business problem  Personas and use cases  Mobile applications Strategy  Success criteria Enterprises need at least two strategies: B2E and B2C 7 © 2012 IBM Corporation
  • 8. Written corporate mobile policy is essential  Terms and conditions  What devices, OS’s and apps are supported  Passcode, device wipe, allowed applications  Corporate owned devices Policy  BYOD and data privacy  Human resources, legal, procurement and reimbursement A comprehensive policy for PCs, smartphones and tablets is recommended 8 © 2012 IBM Corporation
  • 9. Technology implements, monitors and enforces corporate policy  Endpoint management  Encryption  Containerization  Network access Technology  Anti-malware  Authentication Solutions that support multiple endpoints are recommended 9 © 2012 IBM Corporation
  • 10. It’s all about the apps!  Native, web, hybrid, virtual  Out of the box applications  Email, contacts, calendar, file sharing, etc.  Custom applications  Native SDK Technology  Mobile Application Platform  Containerization and application wrapping  Application management and marketplace One size doesn’t fit all 10 © 2012 IBM Corporation
  • 11. Employees are the weakest link and education is essential  Identifying cybersecurity threats  Protecting corporate and client data  Safeguarding devices  Data and security incident reporting Education  Build a “culture of security” Published guidelines, online education and social interaction is recommended 11 © 2012 IBM Corporation
  • 12. IBM CIO has embraced mobile IBM's BYOD program "really  435,000 employees worldwide is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to  50% of employees work remotely make sure I can enable them to do that, but in a way that safeguards the integrity of our business.“  50% workforce have less than 5 years of service - IBM CIO Jeanette Horan How did IBM address the challenge? Business outcomes 1. Deploy a secure technology framework  Increased employee productivity  Increased employee satisfaction 2. Develop a strong usage policy  Reduced security risk and loss of corporate data 3. Educate employees for personally owned devices  Over 120,000 employees using mobile devices for 4. Support personally owned devices business with over 80,000 BYOD through social software 12 © 2012 IBM Corporation 1
  • 13. IBM offers products and services to address the complete mobile lifecycle Connect to backend systems Build mobile in support of mobile applications Assess and Plan Manage mobile devices enterprise mobile and applications strategy Secure your mobile business Transform the business by creating Extend existing business new opportunities capabilities to mobile devices 13 13 © 2012 IBM Corporation
  • 14. By engaging a services provider, leading businesses accelerate value from mobile while positioning for long-term success. Benefits resulting from outsourcing 2/3 of chief information officers Free IT staff to focus on other business-critical initiatives (CIOs) plan to partner extensively to gain new skills and expertise Leverage additional skill sets as needed 20% productivity gains and cost Gain in-depth expertise of methodologies and tools savings experienced by CIOs who have outsourced key mobile services Have wider range of mobile activities underway Source: The New Workplace CIO Study, IBM Market Insights, October 2011 14 © 2012 IBM Corporation
  • 15. For more information IBM mobile services ibm.com/services/mobility IBM mobile software ibm.com/software/solutions/mobile-enterprise/ YouTube videos youtube.com/ibmmobileenterprise Follow us on Twitter! @IBMMobile 15 © 2012 IBM Corporation
  • 16. Questions? 16 © 2012 IBM Corporation
  • 17. 17 © 2012 IBM Corporation