APPNATION IVSAN FRANCISCO, CADECEMBER 11-12, 2012
© 2012 IBM Corporation
Speeding Innovation and Extending Reach Securely with Mobile Enterprise
Phil Buckellew, @buckellewVice President, IBM Enterprise Mobile
© 2012 IBM Corporation3
YtY increase in mobile sales during Cyber Monday
Apple’s iPhone and iPad accounted for 77% of all mobile shopping during the two days
YtY increase in mobile traffic to online retailers during the two days
Mobile was a Key Driver in 2012 Black Friday and Cyber Monday Holiday Shopping
Source – IBM Coremetrics Retail Data – as published in 11/24/12 IBM Press Release
© 2012 IBM Corporation4
CEOs are prioritizing customer insights far above other decision areas.
Top Three Areas of Focus for CEOsInsights from the IBM Global Chief Executive officer Study
© 2012 IBM Corporation5 A report from McKinsey & Company: Based on a survey of 250 CIOs on their mobility strategies.
of CIOs plan to allow staff to use personal mobile devices to access company data and applications.
report strong demand from employees to
support a wide rangeof mobile devices.
Almost all the CIOs said they expect to deploy more than 25 mobility applications in the next two years.
of CIOs cite cost as a critical challenge.
of CIOs say laptops could be replaced by tablets in the coming years.
CIOs Perception of Mobility
© 2012 IBM Corporation6
Enterprises are Lagging in Adequate Mobile Skill Sets in Both Mature and Growth Markets
The IT Skill Gap: Mature vs Growth Markets
Have All The Necessary Skills Moderate Skill Gaps Major Skill Gaps
Source: 2012 Tech Trends Study, IBM developerWorks and IBM Center for Applied Insights, November 2012.. Growth Markets including Brazil, Russia, China, India and South Africa.
© 2012 IBM Corporation7
The Key to Successful Mobile App DevelopmentStarts With Design, IT and LOB Working Side By Side
Design IT LOB
© 2012 IBM Corporation8
Build mobile applicationsConnect to, and Run backend systems in support of mobile
TBC is Using Mobile to Transform their Business Model
No longer just a company who provides tires and services around the car, they now provide services to the owner about their car overall.
© 2012 IBM Corporation9
• Over a Million Devices Under Management
• Over 200 Mobile Business Partners
• Reached 100,000 Individuals Through Marketing Programs
• Over 25,000 Participating in Mobile DeveloperWorks Community
• Tripled Development Investment
• Over 300 New Customers
April 2012IBM Cast Iron
March 2012IBM Endpoint
Manager
Jan 2012 IBM Worklight
Oct 2012IBM Security Access
Manager for Cloud and Mobile
April 2012IBM Mobile Foundation
Oct 2012IBM Mobile Connect
June 2012Tealeaf CX Mobile
Nov 2012IBM Mobile
Development Lifecycle Solution
IBM Mobile Momentum
© 2012 IBM Corporation10
IT Ops/CISO Line of BusinessApplication Development
• Building & Deploying Apps
• Mobile Lifecycle Management and Testing
• Data Access & Integration
• Device Management
• Network & Data Security and Management
• App Management
• Business Applications
• User Engagement
• Mobile Analytics and Insight
IBM Mobile Enterprise Capabilities Address the Spectrum of Needs for Successful Transformation
Manage mobile devices and apps
Secure my mobile business
Extend capabilities to mobile
Transform my business
Build mobile apps
Connect & run mobile systems
© 2012 IBM Corporation11
IBM Has Invested Substantially In Mobile To Create A Broad Solutions Portfolio To Help Clients Embrace Mobile
IBM Social& Analytics
IBM Mobile Foundation
IBM Offers a Comprehensive End-to-End Mobile Platform And Services
Manage mobile devices and apps
Secure my mobile business
Extend capabilities to mobile
Transform my business
Build mobile apps
Connect & run mobile systems
IBM Mobile Services
Mobile Application Innovation Services
Mobile Infrastructure Strategy and Planning Mobile Enterprise Services
for Managed Mobility
IBM Interactive Design
IBM Endpoint Manager for Mobile Devices IBM Connections, SameTime, ECM, Tealeaf
© 2012 IBM Corporation12
Platform Governance Tooling Capabilities
IBM Worklight 5.0.5New Features and Enhancements
• SMS notifications
• New target devices: Windows 8, Java ME
• Updates: iOS6, Android 4.1, Cordova 2.2
• Highly available app store
• Integration with IBM MDM (IBM Endpoint Manager)
• jQuery tooling support
• Native libraries for iOS and Android
• Encryptable JSON database
• Supports offline synchronization
Worklight Studio
Worklight Server
←
Worklight Run-time Components
Worklight Console
Worklight App Center
© 2012 IBM Corporation13
Mobile Testing Tech Preview
• Dynamic Instrumentation of Android Mobile Applications (without requiring source / static enablement)
Key Benefits• Automated mobile function testing
• Native Android support
Deep Application Instrumentation for Mobile Function Test
© 2012 IBM Corporation14
Tealeaf CX MobileCustomer Experience Management Software
Visibility Speed Investment
Visibility into your mobile usage
across the user base, site and apps
Rapidly evaluate mobile features – adoption, success
& failure points
Quantify business impact to prioritize
decisions: fix, invest or remove
Apply the power of Tealeaf's industry-leading customer experience management solutions to your mobile channel
© 2012 IBM Corporation15
AppScan Mobile SecurityLeading Application Security Testing Suite
Value Proposition• Identify & remediate mobile app
security early in SDLC• Protect enterprise brand
Problem Solved• Data leakage• Confidentiality leakage (e.g. GPS)• Fraudulent use of application• Identifies what data needs protecting
Initial support for Android available now.
Which QR Code Is Evil?
Why AppScan• Market Leader • Product Line Extension • Fastest Time To Market
Use AppScan toValidate URLs Before
Opening Browsers
© 2012 IBM Corporation16
GovernedPolicy
• Context: On site inside the ER, on the hospital network, authorized doctor on shift
• Function: All app features
• Data: Full data access and storage
• Security: Single-factor authentication
• Context: At coffee shop, on an unsecured network, authorized doctor on call
• Function: Designated features only
• Data: Specific encrypted data
• Security: Two-factor authentication
Mobile Context Influences RiskIntegration: IBM Worklight and IBM Security Access Manager
© 2012 IBM Corporation17
Extending Visibility, Control and Automation to Mobile Devices
SystemsManagement
Security Management
One Console,
One infrastructure
Unified Device Mgmt
Desktops & Laptops
Smartphones & Tablets
Servers
Endpoint Manager
© 2012 IBM Corporation18
New and Updated Solutions Announced In 4Q12
IBM Social Business, Commerce & Analytics• IBM Connections 4 Mobile leveraging location services
IBM Mobile Services
Mobile Application Innovation Services
Mobile Infrastructure Strategy and Planning
Mobile Enterprise Servicesfor Managed Mobility
IBM Security Access Manager• Context based security enabled for cloud and mobile
• Rapid support for iOS6• Support for native and offline apps• Extended support for BYOD• Enterprise and App Store linkage• Hosted & on-premise services
IBM Mobile Foundation
IBM Mobile Development Lifecycle Solution • Accelerated application delivery
Build mobile apps
Connect & run mobile systems
Manage mobile devices and apps
Secure my mobile business
Extend capabilities to mobile
Transform my business
IBM Tealeaf CX Mobile• Visibility into usage across the user base, site and apps
© 2012 IBM Corporation19
One Day No-Charge Workshop
• Help you define or assess your Mobile Enterprise strategy
• Develop a roadmap for both client apps and BYOD challenges
• Get insights from IBM's management of millions of devices around the globe
• Gain tips from IBM's market leading Interactive Design Team on designing mobile apps
Sign up now by sending an email to: [email protected]
Sign Up Now for the IBM Mobile Enterprise Workshop
© 2012 IBM Corporation20
Three Ways to Get Started with IBM
1 Download the free IBM Worklight Developer Edition: ibm.co/worklightde
Sign up for the IBM Mobile Enterprise workshop: Email us at [email protected]
3 Learn more at www.ibm.com/mobile-enterpriseInteract with us @ibmmobile and #ibmmobile
© 2012 IBM Corporation21
© 2012 IBM Corporation22
Legal Disclaimer
• © IBM Corporation 2011. All Rights Reserved.• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM ’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.