© 2012 IBM Corporation Best practices for mobile enterprise security Chris Pepin IBM Global Mobile Offering Manager and Evangelist
Oct 19, 2014
copy 2012 IBM Corporation
Best practices for mobile enterprise security
Chris PepinIBM Global Mobile Offering Manager and Evangelist
copy 2012 IBM Corporation2
Mobile is a milestone in the evolution of computing
Mainframe
Client
server
Web
Mobile
amp cloud
Source IBM press release November 2012
copy 2012 IBM Corporation3
Enterprise are faced with multiple mobile challenges
ldquoConsumerization of ITrdquo forcing chief information officers s to have
ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice
Anytime anywhere any device access now standard
Social business interactions are increasingly important
Lifecycle complexity
Complexity of multiple device platforms
Unique mobile requirements for employeesworkers
Extending data voice and video applications to mobile devices
Integrating across wired or wireless local area network (LAN) platforms
Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)
Protection of privacy and confidential information
Policies for client-owned smartphones and tablets
Visibility security and management of mobile platform requirements
Business
and
IT change
Security and
management
copy 2012 IBM Corporation4
Mobile security is top of mind for todayrsquos CIOrsquos
Advanced mobile security 76
Application virtualization 67
Enterprise mobile strategy 66
Multi-device mobile access 66
Tablets to augment PCs 64
Unified communications 58
Source The New Workplace CIO Study IBM Market Insights October 2011
copy 2012 IBM Corporation5
There are multiple mobile security risks to address
1 in 20 mobile devices were stolen
in 20101
In 2011 mobile
device users saw
155 increase in malware
across all platforms1
Google Android
malware grew
400from June 2010 to
January 20111
Loss and theft Malware
sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011
sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011
Wi-Fi hotspot are set to increase
350 by 2015 provided more opportunities for
ldquoman-in-the-middlerdquo attacks1
Spam Wi-Fi
70 of mobile device spam
is fraudulent financial services2
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation2
Mobile is a milestone in the evolution of computing
Mainframe
Client
server
Web
Mobile
amp cloud
Source IBM press release November 2012
copy 2012 IBM Corporation3
Enterprise are faced with multiple mobile challenges
ldquoConsumerization of ITrdquo forcing chief information officers s to have
ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice
Anytime anywhere any device access now standard
Social business interactions are increasingly important
Lifecycle complexity
Complexity of multiple device platforms
Unique mobile requirements for employeesworkers
Extending data voice and video applications to mobile devices
Integrating across wired or wireless local area network (LAN) platforms
Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)
Protection of privacy and confidential information
Policies for client-owned smartphones and tablets
Visibility security and management of mobile platform requirements
Business
and
IT change
Security and
management
copy 2012 IBM Corporation4
Mobile security is top of mind for todayrsquos CIOrsquos
Advanced mobile security 76
Application virtualization 67
Enterprise mobile strategy 66
Multi-device mobile access 66
Tablets to augment PCs 64
Unified communications 58
Source The New Workplace CIO Study IBM Market Insights October 2011
copy 2012 IBM Corporation5
There are multiple mobile security risks to address
1 in 20 mobile devices were stolen
in 20101
In 2011 mobile
device users saw
155 increase in malware
across all platforms1
Google Android
malware grew
400from June 2010 to
January 20111
Loss and theft Malware
sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011
sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011
Wi-Fi hotspot are set to increase
350 by 2015 provided more opportunities for
ldquoman-in-the-middlerdquo attacks1
Spam Wi-Fi
70 of mobile device spam
is fraudulent financial services2
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation3
Enterprise are faced with multiple mobile challenges
ldquoConsumerization of ITrdquo forcing chief information officers s to have
ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice
Anytime anywhere any device access now standard
Social business interactions are increasingly important
Lifecycle complexity
Complexity of multiple device platforms
Unique mobile requirements for employeesworkers
Extending data voice and video applications to mobile devices
Integrating across wired or wireless local area network (LAN) platforms
Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)
Protection of privacy and confidential information
Policies for client-owned smartphones and tablets
Visibility security and management of mobile platform requirements
Business
and
IT change
Security and
management
copy 2012 IBM Corporation4
Mobile security is top of mind for todayrsquos CIOrsquos
Advanced mobile security 76
Application virtualization 67
Enterprise mobile strategy 66
Multi-device mobile access 66
Tablets to augment PCs 64
Unified communications 58
Source The New Workplace CIO Study IBM Market Insights October 2011
copy 2012 IBM Corporation5
There are multiple mobile security risks to address
1 in 20 mobile devices were stolen
in 20101
In 2011 mobile
device users saw
155 increase in malware
across all platforms1
Google Android
malware grew
400from June 2010 to
January 20111
Loss and theft Malware
sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011
sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011
Wi-Fi hotspot are set to increase
350 by 2015 provided more opportunities for
ldquoman-in-the-middlerdquo attacks1
Spam Wi-Fi
70 of mobile device spam
is fraudulent financial services2
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation4
Mobile security is top of mind for todayrsquos CIOrsquos
Advanced mobile security 76
Application virtualization 67
Enterprise mobile strategy 66
Multi-device mobile access 66
Tablets to augment PCs 64
Unified communications 58
Source The New Workplace CIO Study IBM Market Insights October 2011
copy 2012 IBM Corporation5
There are multiple mobile security risks to address
1 in 20 mobile devices were stolen
in 20101
In 2011 mobile
device users saw
155 increase in malware
across all platforms1
Google Android
malware grew
400from June 2010 to
January 20111
Loss and theft Malware
sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011
sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011
Wi-Fi hotspot are set to increase
350 by 2015 provided more opportunities for
ldquoman-in-the-middlerdquo attacks1
Spam Wi-Fi
70 of mobile device spam
is fraudulent financial services2
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation5
There are multiple mobile security risks to address
1 in 20 mobile devices were stolen
in 20101
In 2011 mobile
device users saw
155 increase in malware
across all platforms1
Google Android
malware grew
400from June 2010 to
January 20111
Loss and theft Malware
sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011
sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011
Wi-Fi hotspot are set to increase
350 by 2015 provided more opportunities for
ldquoman-in-the-middlerdquo attacks1
Spam Wi-Fi
70 of mobile device spam
is fraudulent financial services2
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation6
Strategy
Mobile security involves strategy policy education and technology
PolicyEducation
Technology
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation7
The mobile enterprise starts with defining a strategy
Defining the business problem
Personas and use cases
Mobile applications
Success criteriaStrategy
Enterprises need at least two strategies B2E and B2C
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation8
Written corporate mobile policy is essential
Terms and conditions
What devices OSrsquos and apps are supported
Passcode device wipe allowed applications
Corporate owned devices
BYOD and data privacy
Human resources legal procurement and
reimbursement
Policy
A comprehensive policy for PCs smartphones and tablets is recommended
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation9
Technology implements monitors and enforces corporate policy
Endpoint management
Encryption
Containerization
Network access
Anti-malware
Authentication
Technology
Solutions that support multiple endpoints are recommended
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation10
Itrsquos all about the apps
Native web hybrid virtual
Out of the box applications
Email contacts calendar file sharing etc
Custom applications
Native SDK
Mobile Application Platform
Containerization and application wrapping
Application management and marketplace
Technology
One size doesnrsquot fit all
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation11
Employees are the weakest link and education is essential
Identifying cybersecurity threats
Protecting corporate and client data
Safeguarding devices
Data and security incident reporting
Build a ldquoculture of securityrdquo
Education
Published guidelines online education and social interaction is recommended
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation12
1
2
IBM CIO has embraced mobile
435000 employees worldwide
50 of employees work remotely
50 workforce have less than 5 years of service
Business outcomes
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120000 employees using mobile devices for business with over 80000 BYOD
3 Educate employees
4 Support personally owned devices through social software
1 Deploy a secure technology framework
2 Develop a strong usage policy
IBMs BYOD program really
is about supporting
employees in the way they
want to work They will find
the most appropriate tool to
get their job done I want to
make sure I can enable them
to do that but in a way that
safeguards the integrity of our
businessldquo
- IBM CIO Jeanette Horan
How did IBM address the challenge
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation1313
IBM offers products and services to address the complete mobile
lifecycle
Connect to backend systems in support of mobile
Manage mobile devices and applications
Transform the business by creating
new opportunitiesExtend existing business capabilities to mobile devices
Build mobile applications
Secure your mobile business
Assess and Planenterprise mobile strategy
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation14
23of chief information officers
(CIOs) plan to partner
extensively to gain new
skills and expertise
20productivity gains and cost
savings experienced by
CIOs who have outsourced
key mobile services
By engaging a services provider leading businesses accelerate
value from mobile while positioning for long-term success
Benefits resulting from outsourcing
Source The New Workplace CIO Study IBM Market Insights October 2011
Leverage additional skill sets
as needed
Free IT staff to focus on other
business-critical initiatives
Have wider range of mobile
activities underway
Gain in-depth expertise of
methodologies and tools
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation15
For more information
IBM mobile services
ibmcomservicesmobility
IBM mobile software
ibmcomsoftwaresolutionsmobile-enterprise
YouTube videos
youtubecomibmmobileenterprise
Follow us on Twitter IBMMobile
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation16
Questions
copy 2012 IBM Corporation17
copy 2012 IBM Corporation17