Top Banner
© 2012 IBM Corporation Best practices for mobile enterprise security Chris Pepin IBM Global Mobile Offering Manager and Evangelist
17

Best practices for mobile enterprise security

Oct 19, 2014

Download

Technology

Presented at CSO Perspectives Seminar on Enabling and Securing the Mobile Enterprise conference in Boston, MA on November 15 at the Westin Boston Waterfront
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Best practices for mobile enterprise security

copy 2012 IBM Corporation

Best practices for mobile enterprise security

Chris PepinIBM Global Mobile Offering Manager and Evangelist

copy 2012 IBM Corporation2

Mobile is a milestone in the evolution of computing

Mainframe

Client

server

Web

Mobile

amp cloud

Source IBM press release November 2012

copy 2012 IBM Corporation3

Enterprise are faced with multiple mobile challenges

ldquoConsumerization of ITrdquo forcing chief information officers s to have

ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice

Anytime anywhere any device access now standard

Social business interactions are increasingly important

Lifecycle complexity

Complexity of multiple device platforms

Unique mobile requirements for employeesworkers

Extending data voice and video applications to mobile devices

Integrating across wired or wireless local area network (LAN) platforms

Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)

Protection of privacy and confidential information

Policies for client-owned smartphones and tablets

Visibility security and management of mobile platform requirements

Business

and

IT change

Security and

management

copy 2012 IBM Corporation4

Mobile security is top of mind for todayrsquos CIOrsquos

Advanced mobile security 76

Application virtualization 67

Enterprise mobile strategy 66

Multi-device mobile access 66

Tablets to augment PCs 64

Unified communications 58

Source The New Workplace CIO Study IBM Market Insights October 2011

copy 2012 IBM Corporation5

There are multiple mobile security risks to address

1 in 20 mobile devices were stolen

in 20101

In 2011 mobile

device users saw

155 increase in malware

across all platforms1

Google Android

malware grew

400from June 2010 to

January 20111

Loss and theft Malware

sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011

sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011

Wi-Fi hotspot are set to increase

350 by 2015 provided more opportunities for

ldquoman-in-the-middlerdquo attacks1

Spam Wi-Fi

70 of mobile device spam

is fraudulent financial services2

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 2: Best practices for mobile enterprise security

copy 2012 IBM Corporation2

Mobile is a milestone in the evolution of computing

Mainframe

Client

server

Web

Mobile

amp cloud

Source IBM press release November 2012

copy 2012 IBM Corporation3

Enterprise are faced with multiple mobile challenges

ldquoConsumerization of ITrdquo forcing chief information officers s to have

ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice

Anytime anywhere any device access now standard

Social business interactions are increasingly important

Lifecycle complexity

Complexity of multiple device platforms

Unique mobile requirements for employeesworkers

Extending data voice and video applications to mobile devices

Integrating across wired or wireless local area network (LAN) platforms

Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)

Protection of privacy and confidential information

Policies for client-owned smartphones and tablets

Visibility security and management of mobile platform requirements

Business

and

IT change

Security and

management

copy 2012 IBM Corporation4

Mobile security is top of mind for todayrsquos CIOrsquos

Advanced mobile security 76

Application virtualization 67

Enterprise mobile strategy 66

Multi-device mobile access 66

Tablets to augment PCs 64

Unified communications 58

Source The New Workplace CIO Study IBM Market Insights October 2011

copy 2012 IBM Corporation5

There are multiple mobile security risks to address

1 in 20 mobile devices were stolen

in 20101

In 2011 mobile

device users saw

155 increase in malware

across all platforms1

Google Android

malware grew

400from June 2010 to

January 20111

Loss and theft Malware

sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011

sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011

Wi-Fi hotspot are set to increase

350 by 2015 provided more opportunities for

ldquoman-in-the-middlerdquo attacks1

Spam Wi-Fi

70 of mobile device spam

is fraudulent financial services2

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 3: Best practices for mobile enterprise security

copy 2012 IBM Corporation3

Enterprise are faced with multiple mobile challenges

ldquoConsumerization of ITrdquo forcing chief information officers s to have

ldquobring-your-own-devicerdquo (BYOD) policy and plan provide employeendashdevice choice

Anytime anywhere any device access now standard

Social business interactions are increasingly important

Lifecycle complexity

Complexity of multiple device platforms

Unique mobile requirements for employeesworkers

Extending data voice and video applications to mobile devices

Integrating across wired or wireless local area network (LAN) platforms

Source The New Workplace Chief Information Officer (CIO) Study IBM Market Insights October 2011Review the Flexible Workplace Sellers Assets (Client Presentation Discussion Guide and More)

Protection of privacy and confidential information

Policies for client-owned smartphones and tablets

Visibility security and management of mobile platform requirements

Business

and

IT change

Security and

management

copy 2012 IBM Corporation4

Mobile security is top of mind for todayrsquos CIOrsquos

Advanced mobile security 76

Application virtualization 67

Enterprise mobile strategy 66

Multi-device mobile access 66

Tablets to augment PCs 64

Unified communications 58

Source The New Workplace CIO Study IBM Market Insights October 2011

copy 2012 IBM Corporation5

There are multiple mobile security risks to address

1 in 20 mobile devices were stolen

in 20101

In 2011 mobile

device users saw

155 increase in malware

across all platforms1

Google Android

malware grew

400from June 2010 to

January 20111

Loss and theft Malware

sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011

sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011

Wi-Fi hotspot are set to increase

350 by 2015 provided more opportunities for

ldquoman-in-the-middlerdquo attacks1

Spam Wi-Fi

70 of mobile device spam

is fraudulent financial services2

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 4: Best practices for mobile enterprise security

copy 2012 IBM Corporation4

Mobile security is top of mind for todayrsquos CIOrsquos

Advanced mobile security 76

Application virtualization 67

Enterprise mobile strategy 66

Multi-device mobile access 66

Tablets to augment PCs 64

Unified communications 58

Source The New Workplace CIO Study IBM Market Insights October 2011

copy 2012 IBM Corporation5

There are multiple mobile security risks to address

1 in 20 mobile devices were stolen

in 20101

In 2011 mobile

device users saw

155 increase in malware

across all platforms1

Google Android

malware grew

400from June 2010 to

January 20111

Loss and theft Malware

sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011

sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011

Wi-Fi hotspot are set to increase

350 by 2015 provided more opportunities for

ldquoman-in-the-middlerdquo attacks1

Spam Wi-Fi

70 of mobile device spam

is fraudulent financial services2

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 5: Best practices for mobile enterprise security

copy 2012 IBM Corporation5

There are multiple mobile security risks to address

1 in 20 mobile devices were stolen

in 20101

In 2011 mobile

device users saw

155 increase in malware

across all platforms1

Google Android

malware grew

400from June 2010 to

January 20111

Loss and theft Malware

sup1Juniper Networks Malicious Mobile Threats Report 20102011 May 2011

sup2GSMA Outlines Findings from Spam Reporting Service Pilot press release February 10 2011

Wi-Fi hotspot are set to increase

350 by 2015 provided more opportunities for

ldquoman-in-the-middlerdquo attacks1

Spam Wi-Fi

70 of mobile device spam

is fraudulent financial services2

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 6: Best practices for mobile enterprise security

copy 2012 IBM Corporation6

Strategy

Mobile security involves strategy policy education and technology

PolicyEducation

Technology

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 7: Best practices for mobile enterprise security

copy 2012 IBM Corporation7

The mobile enterprise starts with defining a strategy

Defining the business problem

Personas and use cases

Mobile applications

Success criteriaStrategy

Enterprises need at least two strategies B2E and B2C

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 8: Best practices for mobile enterprise security

copy 2012 IBM Corporation8

Written corporate mobile policy is essential

Terms and conditions

What devices OSrsquos and apps are supported

Passcode device wipe allowed applications

Corporate owned devices

BYOD and data privacy

Human resources legal procurement and

reimbursement

Policy

A comprehensive policy for PCs smartphones and tablets is recommended

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 9: Best practices for mobile enterprise security

copy 2012 IBM Corporation9

Technology implements monitors and enforces corporate policy

Endpoint management

Encryption

Containerization

Network access

Anti-malware

Authentication

Technology

Solutions that support multiple endpoints are recommended

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 10: Best practices for mobile enterprise security

copy 2012 IBM Corporation10

Itrsquos all about the apps

Native web hybrid virtual

Out of the box applications

Email contacts calendar file sharing etc

Custom applications

Native SDK

Mobile Application Platform

Containerization and application wrapping

Application management and marketplace

Technology

One size doesnrsquot fit all

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 11: Best practices for mobile enterprise security

copy 2012 IBM Corporation11

Employees are the weakest link and education is essential

Identifying cybersecurity threats

Protecting corporate and client data

Safeguarding devices

Data and security incident reporting

Build a ldquoculture of securityrdquo

Education

Published guidelines online education and social interaction is recommended

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 12: Best practices for mobile enterprise security

copy 2012 IBM Corporation12

1

2

IBM CIO has embraced mobile

435000 employees worldwide

50 of employees work remotely

50 workforce have less than 5 years of service

Business outcomes

Increased employee productivity

Increased employee satisfaction

Reduced security risk and loss of corporate data for personally owned devices

Over 120000 employees using mobile devices for business with over 80000 BYOD

3 Educate employees

4 Support personally owned devices through social software

1 Deploy a secure technology framework

2 Develop a strong usage policy

IBMs BYOD program really

is about supporting

employees in the way they

want to work They will find

the most appropriate tool to

get their job done I want to

make sure I can enable them

to do that but in a way that

safeguards the integrity of our

businessldquo

- IBM CIO Jeanette Horan

How did IBM address the challenge

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 13: Best practices for mobile enterprise security

copy 2012 IBM Corporation1313

IBM offers products and services to address the complete mobile

lifecycle

Connect to backend systems in support of mobile

Manage mobile devices and applications

Transform the business by creating

new opportunitiesExtend existing business capabilities to mobile devices

Build mobile applications

Secure your mobile business

Assess and Planenterprise mobile strategy

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 14: Best practices for mobile enterprise security

copy 2012 IBM Corporation14

23of chief information officers

(CIOs) plan to partner

extensively to gain new

skills and expertise

20productivity gains and cost

savings experienced by

CIOs who have outsourced

key mobile services

By engaging a services provider leading businesses accelerate

value from mobile while positioning for long-term success

Benefits resulting from outsourcing

Source The New Workplace CIO Study IBM Market Insights October 2011

Leverage additional skill sets

as needed

Free IT staff to focus on other

business-critical initiatives

Have wider range of mobile

activities underway

Gain in-depth expertise of

methodologies and tools

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 15: Best practices for mobile enterprise security

copy 2012 IBM Corporation15

For more information

IBM mobile services

ibmcomservicesmobility

IBM mobile software

ibmcomsoftwaresolutionsmobile-enterprise

YouTube videos

youtubecomibmmobileenterprise

Follow us on Twitter IBMMobile

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 16: Best practices for mobile enterprise security

copy 2012 IBM Corporation16

Questions

copy 2012 IBM Corporation17

Page 17: Best practices for mobile enterprise security

copy 2012 IBM Corporation17