SlideShare une entreprise Scribd logo
1  sur  25
Mobility – bring your own device
Vijay Dheap
 Global Product Manager, IBM Mobile Security Solutions
 IBM Master Inventor


 IBM Mobile Management & Security
DELIVERING CONFIDENCE
It’s a (Smarter) Mobile World!

                                                      In 2011 sales of smartphones surpassed that of
                                                      PCs, soon they will dwarf the sales of PCs
                                                      - Business Insider




Users are increasingly adopting smartphones over
feature phones – as of this year there is a greater
percentage of smartphone users in the US than
feature phone users. This trend is accelerating
worldwide
Employees Bringing Smart Devices To Work…

                                                  By 2015 40% of Enterprise devices will be mobile devices
                                                                                               - IBM Projection




Bring Your Own Device (BYOD)
The trajectory of adoption is coming from the consumer
space into the enterprise.
Greater propensity for users of smartphones and tablets to
use their personal devices for work
Organizations starting to view BYOD for its business value
and organizations recognizing the competitive
differentiation it can offer
Mobility as an Enabler
Business value driven by mobility is opening up unique opportunities




                               European Bank improves employee productivity by enabling transactions
                               via mobile devices and earns greater customer loyalty through convenient
                               banking options via mobile devices



                               US Utility Company achieves greater responsiveness by empowering field
                               employees to derive solutions to address operational issues by enabling
                               mobile access and collaboration
IBM strategy addresses client mobile initiatives

Extend & Transform                                     Build & Connect
Extend existing business                               Build mobile applications
capabilities to mobile devices                         Connect to, and run backend
Transform the business by                              systems in support of mobile
creating new opportunities




              Manage & Secure
              Manage mobile devices and applications
              Secure my mobile business
Uniqueness of Mobile…

 Mobile devices                Mobile devices          Mobile devices           Mobile devices              Mobile devices
 are shared more               have multiple           are diverse              are used in more            prioritise the
                                                      .
 often                         personas                                         locations                   user

• Personal phones and      •   Work tool              • OS immaturity for      • A single location could   • Conflicts with user
  tablets shared with      •   Entertainment device     enterprise mgmt          offer public, private,      experience not
  family                                              • BYOD dictates            and cell connections        tolerated
                           •   Personal organiser
• Enterprise tablet                                     multiple OSs           • Anywhere, anytime         • OS architecture puts
                           •   Security profile per
  shared with co-                                     • Vendor / carrier       • Increasing reliance on      the user in control
                               persona?
  workers                                               control dictates         enterprise WiFi           • Difficult to enforce
• Social norms of mobile                                multiple OS versions   • Devices more likely to      policy, app lists
  apps vs. file systems                               • Diverse app              be lost/stolen            • Security policies have
                                                        development/delivery                                 less of a chance of
                                                        model                                                dictating experience
Mobile Security Risks, Concerns & Emerging Threats
OWASP Mobile Security Project:
Top 10 Mobile Risks, (Release Candidate v1.0)
1.Insecure Data Storage

2.Weak Server Side Controls

3.Insufficient Transport Layer Protection

4.Client Side Injection

5.Poor Authorization and Authentication

6.Improper Session Handling

7.Security Decisions Via Untrusted Inputs

8.Side Channel Data Leakage                     Emerging Mobile Threats
                                                Social Engineering        Mobile Borne DoS Attacks
9.Broken Cryptography
                                                Rogue Apps                Identity Theft
10.Sensitive Information Disclosure             Malicious Websites        Man-in-the-Middle Attacks
Mobile Security Challenges Faced By Enterprises
                                       Personal vs corporate
      Achieving Data Separation &      Data leakage into and out of the enterprise
      Providing Data Protection        Partial wipe vs. device wipe vs legally defensible wipe
                                       Data policies

                                       Multiple device platforms and variants
                                       Multiple providers
      Adapting to the BYOD/            Managed devices (B2E)
                                       Unmanaged devices (B2B,B2E, B2C)
      Consumerization of IT Trend      Endpoint policies
                                       Threat protection


                                       Identity of user and devices
      Providing secure access to       Authentication, Authorization and Federation
      enterprise applications & data   User policies
                                       Secure Connectivity


                                       Application life-cycle
      Developing Secure Applications   Vulnerability & Penetration testing
                                       Application Management
                                       Application policies



      Designing & Instituting an       Policy Management: Location, Geo, Roles, Response, Time policies
                                       Security Intelligence
      Adaptive Security Posture        Reporting
Visualizing Mobile Security
                    WiFi                                  Mobile
                                                          apps        Develop, test and
                                                                      deliver safe
                                                           Web        applications
                                   Internet                sites


                  Telecom
Secure            Provider
endpoint
device and
                                               Security            Corporate
data                                           Gateway             Intranet &
             Achieve Visibility and Enable                         Systems
             Adaptive Security Posture        Secure access to enterprise
                                              applications and data
Getting Started with Mobile Security Solutions…


Business Need:                           Business Need:                          Business Need:
Protect Data & Applications on the       Protect Enterprise Systems & Deliver    Build, Test and Run Secure Mobile
Device                                   Secure Access                           Apps

Prevent Loss or Leakage of Enterprise   Provide secure access to enterprise    Enforce Corporate Development Best
Data                                     systems                                 Practices
        Wipe                                     VPN                                    Development tools
        Local Data Encryption           Prevent unauthorized access to                     enforcing security policies
Protect Access to the Device            enterprise systems                      Testing mobile apps for exposure to
        Device lock                              Identity                      threats
Mitigate exposure to vulnerabilities             Certificate management                 Penetration Testing
        Anti-malware                             Authentication                         Vulnerability Testing
        Push updates                             Authorization                 Provide Offline Access
        Detect jailbreak                         Audit                                  Encrypted Local Storage of
        Detect non-compliance           Protect users from Internet borne                  Credentials
Protect Access to Apps                  threats                                 Deliver mobile apps securely
        App disable                              Threat protection                      Enterprise App Store
        User authentication             Enforce Corporate Policies             Prevent usage of compromised apps
Enforce Corporate Policies                       Anomaly Detection                      Detect and disable
                                                  Security challenges for                   compromised apps
                                                      access to sensitive data
IBM Mobile Security & Management Solutions
 Management & Security of Users, Devices and Apps
IBM Endpoint Manager for Mobile                                 IBM Security Access Manager (ISAM)
  •   Single management infrastructure for all endpoints          •   Users & Devices context aware Authentication &
  •   Gain visibility and control over BYOD devices                   Authorization
  •   Core capabilities include: device lock, selective wipe,     •   Standards Support: OAuth, SAML, OpenID
      jailbreak/root detection, password policy enforcement       •   Single Sign-On & Identity Mediation

IBM AppScan for Mobile                                          IBM Lotus Mobile Connect
  •   Vulnerability testing of applications                       •   Secure Connectivity
                                                                  •   App level VPN
IBM WebSphere DataPower
  •   Enterprise applications protection                        IBM QRadar
  •   XML security & message protection                           •   System-wide Mobile Security Awareness
  •   Protocol Transformation & Mediation                         •   Risk Assessment
                                                                  •   Threat Detection
DEEP-DIVE: DELIVERING CONFIDENCE




13                             © 2012 IBM Corporation
Mobile Device Security
IBM Endpoint Manager for Mobile Devices: A highly-scalable, unified solution that delivers device management and security
across device types and operating systems for superior visibility and control


                                                                     Client Challenge
    Managed = Secure
                                                                     Managing and securing enterprise and BYOD mobile
                             Common agent                            devices without additional resources
                             Unified console
      Systems                Common            Security              Key Capabilities
      management             infrastructure    management
                             Single server                           • A unified systems and security management solution for
                                                                       all enterprise devices
                                                                     • Near-instant deployment of new features and reports in
                  IBM Endpoint Manager                                 to customer’s environments
                                                                     • Platform to extend integrations with Service Desk,
                                                                       CMDB, SIEM, and other information-gathering systems
                                                                       to mobile devices
                                                                     • Advanced mobile device management capabilities for
 Desktop / laptop / server     Mobile          Purpose-specific        iOS, Android, Symbian, and Windows Mobile, Windows
 endpoint                      endpoint        endpoint                Phone
                                                                     • Security threat detection and automated remediation
Mobile Access Security
IBM Security Access Manager for Mobile: Delivers user security by authenticating and
authorizing the user and their device
                                                                Client Challenge
            IBM
                                                                Ensuring users and devices are authorized to
            Access                 Access Manager               access enterprise resources from that specific
            Manager                Servers
                                                                device.
                        External Authentication
 VPN or
 HTTPS
                        Provider
                                       User registries (i.e.    Key Capabilities
                                       LDAP)
                                                                • Satisfy complex context-aware authentication
                                                 Federated ID
                                                 Mgr              requirements
                                                                • Reverse proxy, authentication, authorization,
                                                                  and federated identity
                                                                • Mobile native, hybrid, and web apps
                        Application Servers
                        (WebSphere, WorkLight)                  • Flexibility in authentication: user id/password,
                                                                  basic auth, certificate, or custom
                                                                • Supports open standards applicable to mobile
                           Web Services
                                            Web Apps              such as OAuth
                                                                • Advanced Session Management
Mobile Access Security
IBM Lotus® Mobile Connect: Provides features that help deliver a security-rich connection to enterprise
resources from mobile devices.

  Client Challenge                                    Key Capabilities
  • Need to protect enterprise data in transit from   •Clientless app-level Virtual Public Network (VPN) with a
    mobile devices to back-end systems
                                                      •Strong authentication and encryption of data in transit
Mobile App Security
AppScan: app security testing and risk management

                                                    Client Challenge
                                                    Applying patches and resolving application
                                                      vulnerabilities after apps are Delivered and
                                                      Deployed is a very costly and time consuming
                                                      exercise
                                                    Key Capabilities
                                                    • Leverage AppScan for vulnerability testing of
                                                      mobile web apps and web elements
                                                      (JavaScript, HTML5) of hybrid mobile apps
                                                    • Vulnerabilities and coding errors can be
                                                      addressed in software development and testing
                                                    • Code vulnerable to known threat models can
                                                      be identified in testing
                                                    • Security designed in vs. bolted on
Mobile App Security
WorkLight: Develop, deliver and deploy security-rich mobile apps to streamline business activities while
also delivering a rich user experience

                                                              Client Challenge
                                                             Efficiently and securely, create and run HTML5,
                                                             hybrid and native mobile apps for a broad set of
                                                             mobile devices
                                                              Key Capabilities
                                                             • Integrated secure access to backend
                                                               application resources
                                                             • Secured by design - develop secure mobile
                                                               apps using corporate best practices, code
                                                               obfuscation
                                                             • Protect mobile app data with encrypted local
                                                               storage for data, offline user access, app
                                                               authenticity validation, and enforcement of
                                                               organizational security policies
                                                             • Maximize mobile app performance with
                                                               analytics, remote disabling of apps
Mobile Security Intelligence
Qradar: Deliver mobile security intelligence by monitoring data collected from other
mobile security solutions – visibility, reporting and threat detection

                                                 Client Challenge
                                                 Visibility of security events across
                                                 the enterprise, to stay ahead of the threat, show
                                                 compliance and reduce enterprise risk


                                                 Key Capabilities
                                                 • Integrated intelligent actionable
                                                   platform for
                                                      • Searching
                                                      • Filtering
                                                      • Rule writing
                                                      • Reporting functions
                                                 • A single user interface for
                                                      • Log management
                                                      • Risk modeling
                                                      • Vulnerability prioritization
                                                      • Incident detection
                                                      • Impact analysis tasks
Securing the Mobile Enterprise with IBM Solutions
CUSTOMER CASE STUDIES




21                           © 2012 IBM Corporation
IBM Case Study
                        Extending Corporate Access
                        “IBM's BYOD program “really is about supporting employees in the
                        way they want to work. They will find the most appropriate tool to
                        get their job done. I want to make sure I can enable them to do
                        that, but in a way that safeguards the integrity of our business.”

                        Jeanette Horan, IBM CIO

  Customer Needs                                       Key Features & Outcomes

 Support BYOD for a variety of mobile            120,000 mobile devices, 80,000 personally
  platforms securely for a highly mobile           owned, supported in months
  population
                                                  Integrated Lotus Traveler, IBM Connections,
 Scale to hundreds of thousands of devices        IBM Sametime, and IBM Endpoint Manager
Leading European Bank
                          European Bank to Deliver Secure Mobile Internet Banking

                          AimArs needed to reduce operational complexity and cost with a single, scalable
                          infrastructure to secure access to various back-end services from multiple mobile apps. A
                          customized authentication mechanism empowered the bank to guarantee the security of
                          its customers while safeguarding the trust relationship with a safe app platform that
                          encrypts local data and delivers app updates immediately.



  Customer Needs                                               Key Features & Outcomes

• Extend secure access to banking apps to mobile            • Authenticates requests made via HTTPS from
  customers                                                   hybrid mobile apps running on WorkLight platform
• Enhance productivity of employees to perform                to back-end services
  secure banking transactions via mobile devices            • A custom certificates-based authentication
• Support for iOS, Android, and Windows Mobile                mechanism implemented to secure back-end
                                                              banking application
Major Utility Company
                             Adding Mobile Devices Without Adding Infrastructure

                             Serving 4.5 million customers in the southwestern region of the
                             United States, this electric company of 25,000 employees is a
                             leader in clean energy while exceeding reliability standards and
                             keeping consumer costs below average. They are experiencing a
                             migration from traditional endpoints to mobile devices.

  Customer Needs                                               Key Features & Outcomes
• Support 20,000+ mobile devices                            • Scalability to 250,000 endpoints provides room to grow
• Corporate and employee-owned, many platforms and OS       • Added mobile devices to existing IEM deployment in
  versions                                                    days
• High availability for certain devices used in the field   • Ability to integrate with Maximo, Remedy
• Adherence to Internal security policies, external         • Responsiveness and agility of product and product team
  regulations
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US

Contenu connexe

Tendances

IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...AIP Foundation
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 

Tendances (20)

IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012Mobile – Adoption and Adaption in 2012
Mobile – Adoption and Adaption in 2012
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 

En vedette

Ibm pure flex client presentation
Ibm pure flex client presentationIbm pure flex client presentation
Ibm pure flex client presentationArrow ECS UK
 
Ibm presentation ppt
Ibm presentation pptIbm presentation ppt
Ibm presentation pptravish28
 
IBM Innovate 2013 Session: DevOps 101
IBM Innovate 2013 Session: DevOps 101IBM Innovate 2013 Session: DevOps 101
IBM Innovate 2013 Session: DevOps 101Sanjeev Sharma
 
IBM Presentation
IBM PresentationIBM Presentation
IBM Presentationrolsen3
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenIBM Danmark
 
Presentazione IBM Flex System e System x Evento Venaria 14 ottobre
Presentazione IBM Flex System e System x Evento Venaria 14 ottobrePresentazione IBM Flex System e System x Evento Venaria 14 ottobre
Presentazione IBM Flex System e System x Evento Venaria 14 ottobrePRAGMA PROGETTI
 
CBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingCBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingHenrik Hasselbalch
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
Linux Open source extreme virtualization consolidation for både små og store...
Linux Open source extreme virtualization consolidation for både små  og store...Linux Open source extreme virtualization consolidation for både små  og store...
Linux Open source extreme virtualization consolidation for både små og store...IBM Danmark
 
IBM Social Business Agenda template
IBM Social Business Agenda templateIBM Social Business Agenda template
IBM Social Business Agenda templateFlávio Mendes
 
1.ibm pure flex system mar 2013
1.ibm pure flex system   mar 20131.ibm pure flex system   mar 2013
1.ibm pure flex system mar 2013solarisyougood
 
Apresentação corporativa: O Boticário
Apresentação corporativa: O BoticárioApresentação corporativa: O Boticário
Apresentação corporativa: O BoticárioCasulo
 
IBM Overview and Case Study
IBM Overview and Case StudyIBM Overview and Case Study
IBM Overview and Case StudyDaryl Pereira
 
Conduite du changement : Etude de Cas IBM
Conduite du changement : Etude de Cas IBMConduite du changement : Etude de Cas IBM
Conduite du changement : Etude de Cas IBMHELENE FRIEH
 
Forward thinking: What's next for AI
Forward thinking: What's next for AIForward thinking: What's next for AI
Forward thinking: What's next for AIIBM
 

En vedette (17)

Ibm pure flex client presentation
Ibm pure flex client presentationIbm pure flex client presentation
Ibm pure flex client presentation
 
Ibm presentation ppt
Ibm presentation pptIbm presentation ppt
Ibm presentation ppt
 
IBM Innovate 2013 Session: DevOps 101
IBM Innovate 2013 Session: DevOps 101IBM Innovate 2013 Session: DevOps 101
IBM Innovate 2013 Session: DevOps 101
 
IBM Presentation
IBM PresentationIBM Presentation
IBM Presentation
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Pure application system
Pure application systemPure application system
Pure application system
 
Porque o VOI é o novo ROI
Porque o VOI é o novo ROIPorque o VOI é o novo ROI
Porque o VOI é o novo ROI
 
Presentazione IBM Flex System e System x Evento Venaria 14 ottobre
Presentazione IBM Flex System e System x Evento Venaria 14 ottobrePresentazione IBM Flex System e System x Evento Venaria 14 ottobre
Presentazione IBM Flex System e System x Evento Venaria 14 ottobre
 
CBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingCBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcing
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Linux Open source extreme virtualization consolidation for både små og store...
Linux Open source extreme virtualization consolidation for både små  og store...Linux Open source extreme virtualization consolidation for både små  og store...
Linux Open source extreme virtualization consolidation for både små og store...
 
IBM Social Business Agenda template
IBM Social Business Agenda templateIBM Social Business Agenda template
IBM Social Business Agenda template
 
1.ibm pure flex system mar 2013
1.ibm pure flex system   mar 20131.ibm pure flex system   mar 2013
1.ibm pure flex system mar 2013
 
Apresentação corporativa: O Boticário
Apresentação corporativa: O BoticárioApresentação corporativa: O Boticário
Apresentação corporativa: O Boticário
 
IBM Overview and Case Study
IBM Overview and Case StudyIBM Overview and Case Study
IBM Overview and Case Study
 
Conduite du changement : Etude de Cas IBM
Conduite du changement : Etude de Cas IBMConduite du changement : Etude de Cas IBM
Conduite du changement : Etude de Cas IBM
 
Forward thinking: What's next for AI
Forward thinking: What's next for AIForward thinking: What's next for AI
Forward thinking: What's next for AI
 

Similaire à Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteLeigh Williamson
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USIBM Danmark
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Jeremy Siewert
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nmNitin Gaur
 

Similaire à Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US (20)

Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
UK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynoteUK Innovate 2012 mobile keynote
UK Innovate 2012 mobile keynote
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM USFremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
Fremskynd innovation og nå bredere ud med IBM Mobile, Michael Gilfix, IBM US
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
Introduction to IBM Worklight: Building and connecting cross-platform mobile ...
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Worklight nitin nm
Worklight nitin nmWorklight nitin nm
Worklight nitin nm
 

Plus de IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyIBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjIBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenIBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip NyborgIBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim EscherichIBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenIBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice BayerIBM Danmark
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBMIBM Danmark
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC UpdateIBM Danmark
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introductionIBM Danmark
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminarIBM Danmark
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenIBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyIBM Danmark
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnIBM Danmark
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexIBM Danmark
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichIBM Danmark
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenIBM Danmark
 
Future of Power: IBM Power - Lars Johanneson
Future of Power: IBM Power - Lars JohannesonFuture of Power: IBM Power - Lars Johanneson
Future of Power: IBM Power - Lars JohannesonIBM Danmark
 

Plus de IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 
Future of Power: IBM Power - Lars Johanneson
Future of Power: IBM Power - Lars JohannesonFuture of Power: IBM Power - Lars Johanneson
Future of Power: IBM Power - Lars Johanneson
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US

  • 1. Mobility – bring your own device
  • 2. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor IBM Mobile Management & Security DELIVERING CONFIDENCE
  • 3. It’s a (Smarter) Mobile World! In 2011 sales of smartphones surpassed that of PCs, soon they will dwarf the sales of PCs - Business Insider Users are increasingly adopting smartphones over feature phones – as of this year there is a greater percentage of smartphone users in the US than feature phone users. This trend is accelerating worldwide
  • 4. Employees Bringing Smart Devices To Work… By 2015 40% of Enterprise devices will be mobile devices - IBM Projection Bring Your Own Device (BYOD) The trajectory of adoption is coming from the consumer space into the enterprise. Greater propensity for users of smartphones and tablets to use their personal devices for work Organizations starting to view BYOD for its business value and organizations recognizing the competitive differentiation it can offer
  • 5. Mobility as an Enabler Business value driven by mobility is opening up unique opportunities European Bank improves employee productivity by enabling transactions via mobile devices and earns greater customer loyalty through convenient banking options via mobile devices US Utility Company achieves greater responsiveness by empowering field employees to derive solutions to address operational issues by enabling mobile access and collaboration
  • 6. IBM strategy addresses client mobile initiatives Extend & Transform Build & Connect Extend existing business Build mobile applications capabilities to mobile devices Connect to, and run backend Transform the business by systems in support of mobile creating new opportunities Manage & Secure Manage mobile devices and applications Secure my mobile business
  • 7. Uniqueness of Mobile… Mobile devices Mobile devices Mobile devices Mobile devices Mobile devices are shared more have multiple are diverse are used in more prioritise the . often personas locations user • Personal phones and • Work tool • OS immaturity for • A single location could • Conflicts with user tablets shared with • Entertainment device enterprise mgmt offer public, private, experience not family • BYOD dictates and cell connections tolerated • Personal organiser • Enterprise tablet multiple OSs • Anywhere, anytime • OS architecture puts • Security profile per shared with co- • Vendor / carrier • Increasing reliance on the user in control persona? workers control dictates enterprise WiFi • Difficult to enforce • Social norms of mobile multiple OS versions • Devices more likely to policy, app lists apps vs. file systems • Diverse app be lost/stolen • Security policies have development/delivery less of a chance of model dictating experience
  • 8. Mobile Security Risks, Concerns & Emerging Threats OWASP Mobile Security Project: Top 10 Mobile Risks, (Release Candidate v1.0) 1.Insecure Data Storage 2.Weak Server Side Controls 3.Insufficient Transport Layer Protection 4.Client Side Injection 5.Poor Authorization and Authentication 6.Improper Session Handling 7.Security Decisions Via Untrusted Inputs 8.Side Channel Data Leakage Emerging Mobile Threats Social Engineering Mobile Borne DoS Attacks 9.Broken Cryptography Rogue Apps Identity Theft 10.Sensitive Information Disclosure Malicious Websites Man-in-the-Middle Attacks
  • 9. Mobile Security Challenges Faced By Enterprises Personal vs corporate Achieving Data Separation & Data leakage into and out of the enterprise Providing Data Protection Partial wipe vs. device wipe vs legally defensible wipe Data policies Multiple device platforms and variants Multiple providers Adapting to the BYOD/ Managed devices (B2E) Unmanaged devices (B2B,B2E, B2C) Consumerization of IT Trend Endpoint policies Threat protection Identity of user and devices Providing secure access to Authentication, Authorization and Federation enterprise applications & data User policies Secure Connectivity Application life-cycle Developing Secure Applications Vulnerability & Penetration testing Application Management Application policies Designing & Instituting an Policy Management: Location, Geo, Roles, Response, Time policies Security Intelligence Adaptive Security Posture Reporting
  • 10. Visualizing Mobile Security WiFi Mobile apps Develop, test and deliver safe Web applications Internet sites Telecom Secure Provider endpoint device and Security Corporate data Gateway Intranet & Achieve Visibility and Enable Systems Adaptive Security Posture Secure access to enterprise applications and data
  • 11. Getting Started with Mobile Security Solutions… Business Need: Business Need: Business Need: Protect Data & Applications on the Protect Enterprise Systems & Deliver Build, Test and Run Secure Mobile Device Secure Access Apps Prevent Loss or Leakage of Enterprise Provide secure access to enterprise Enforce Corporate Development Best Data systems Practices  Wipe  VPN  Development tools  Local Data Encryption Prevent unauthorized access to enforcing security policies Protect Access to the Device enterprise systems Testing mobile apps for exposure to  Device lock  Identity threats Mitigate exposure to vulnerabilities  Certificate management  Penetration Testing  Anti-malware  Authentication  Vulnerability Testing  Push updates  Authorization Provide Offline Access  Detect jailbreak  Audit  Encrypted Local Storage of  Detect non-compliance Protect users from Internet borne Credentials Protect Access to Apps threats Deliver mobile apps securely  App disable  Threat protection  Enterprise App Store  User authentication Enforce Corporate Policies Prevent usage of compromised apps Enforce Corporate Policies  Anomaly Detection  Detect and disable  Security challenges for compromised apps access to sensitive data
  • 12. IBM Mobile Security & Management Solutions Management & Security of Users, Devices and Apps IBM Endpoint Manager for Mobile IBM Security Access Manager (ISAM) • Single management infrastructure for all endpoints • Users & Devices context aware Authentication & • Gain visibility and control over BYOD devices Authorization • Core capabilities include: device lock, selective wipe, • Standards Support: OAuth, SAML, OpenID jailbreak/root detection, password policy enforcement • Single Sign-On & Identity Mediation IBM AppScan for Mobile IBM Lotus Mobile Connect • Vulnerability testing of applications • Secure Connectivity • App level VPN IBM WebSphere DataPower • Enterprise applications protection IBM QRadar • XML security & message protection • System-wide Mobile Security Awareness • Protocol Transformation & Mediation • Risk Assessment • Threat Detection
  • 13. DEEP-DIVE: DELIVERING CONFIDENCE 13 © 2012 IBM Corporation
  • 14. Mobile Device Security IBM Endpoint Manager for Mobile Devices: A highly-scalable, unified solution that delivers device management and security across device types and operating systems for superior visibility and control Client Challenge Managed = Secure Managing and securing enterprise and BYOD mobile Common agent devices without additional resources Unified console Systems Common Security Key Capabilities management infrastructure management Single server • A unified systems and security management solution for all enterprise devices • Near-instant deployment of new features and reports in IBM Endpoint Manager to customer’s environments • Platform to extend integrations with Service Desk, CMDB, SIEM, and other information-gathering systems to mobile devices • Advanced mobile device management capabilities for Desktop / laptop / server Mobile Purpose-specific iOS, Android, Symbian, and Windows Mobile, Windows endpoint endpoint endpoint Phone • Security threat detection and automated remediation
  • 15. Mobile Access Security IBM Security Access Manager for Mobile: Delivers user security by authenticating and authorizing the user and their device Client Challenge IBM Ensuring users and devices are authorized to Access Access Manager access enterprise resources from that specific Manager Servers device. External Authentication VPN or HTTPS Provider User registries (i.e. Key Capabilities LDAP) • Satisfy complex context-aware authentication Federated ID Mgr requirements • Reverse proxy, authentication, authorization, and federated identity • Mobile native, hybrid, and web apps Application Servers (WebSphere, WorkLight) • Flexibility in authentication: user id/password, basic auth, certificate, or custom • Supports open standards applicable to mobile Web Services Web Apps such as OAuth • Advanced Session Management
  • 16. Mobile Access Security IBM Lotus® Mobile Connect: Provides features that help deliver a security-rich connection to enterprise resources from mobile devices. Client Challenge Key Capabilities • Need to protect enterprise data in transit from •Clientless app-level Virtual Public Network (VPN) with a mobile devices to back-end systems •Strong authentication and encryption of data in transit
  • 17. Mobile App Security AppScan: app security testing and risk management Client Challenge Applying patches and resolving application vulnerabilities after apps are Delivered and Deployed is a very costly and time consuming exercise Key Capabilities • Leverage AppScan for vulnerability testing of mobile web apps and web elements (JavaScript, HTML5) of hybrid mobile apps • Vulnerabilities and coding errors can be addressed in software development and testing • Code vulnerable to known threat models can be identified in testing • Security designed in vs. bolted on
  • 18. Mobile App Security WorkLight: Develop, deliver and deploy security-rich mobile apps to streamline business activities while also delivering a rich user experience Client Challenge Efficiently and securely, create and run HTML5, hybrid and native mobile apps for a broad set of mobile devices Key Capabilities • Integrated secure access to backend application resources • Secured by design - develop secure mobile apps using corporate best practices, code obfuscation • Protect mobile app data with encrypted local storage for data, offline user access, app authenticity validation, and enforcement of organizational security policies • Maximize mobile app performance with analytics, remote disabling of apps
  • 19. Mobile Security Intelligence Qradar: Deliver mobile security intelligence by monitoring data collected from other mobile security solutions – visibility, reporting and threat detection Client Challenge Visibility of security events across the enterprise, to stay ahead of the threat, show compliance and reduce enterprise risk Key Capabilities • Integrated intelligent actionable platform for • Searching • Filtering • Rule writing • Reporting functions • A single user interface for • Log management • Risk modeling • Vulnerability prioritization • Incident detection • Impact analysis tasks
  • 20. Securing the Mobile Enterprise with IBM Solutions
  • 21. CUSTOMER CASE STUDIES 21 © 2012 IBM Corporation
  • 22. IBM Case Study Extending Corporate Access “IBM's BYOD program “really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business.” Jeanette Horan, IBM CIO Customer Needs Key Features & Outcomes  Support BYOD for a variety of mobile  120,000 mobile devices, 80,000 personally platforms securely for a highly mobile owned, supported in months population  Integrated Lotus Traveler, IBM Connections,  Scale to hundreds of thousands of devices IBM Sametime, and IBM Endpoint Manager
  • 23. Leading European Bank European Bank to Deliver Secure Mobile Internet Banking AimArs needed to reduce operational complexity and cost with a single, scalable infrastructure to secure access to various back-end services from multiple mobile apps. A customized authentication mechanism empowered the bank to guarantee the security of its customers while safeguarding the trust relationship with a safe app platform that encrypts local data and delivers app updates immediately. Customer Needs Key Features & Outcomes • Extend secure access to banking apps to mobile • Authenticates requests made via HTTPS from customers hybrid mobile apps running on WorkLight platform • Enhance productivity of employees to perform to back-end services secure banking transactions via mobile devices • A custom certificates-based authentication • Support for iOS, Android, and Windows Mobile mechanism implemented to secure back-end banking application
  • 24. Major Utility Company Adding Mobile Devices Without Adding Infrastructure Serving 4.5 million customers in the southwestern region of the United States, this electric company of 25,000 employees is a leader in clean energy while exceeding reliability standards and keeping consumer costs below average. They are experiencing a migration from traditional endpoints to mobile devices. Customer Needs Key Features & Outcomes • Support 20,000+ mobile devices • Scalability to 250,000 endpoints provides room to grow • Corporate and employee-owned, many platforms and OS • Added mobile devices to existing IEM deployment in versions days • High availability for certain devices used in the field • Ability to integrate with Maximo, Remedy • Adherence to Internal security policies, external • Responsiveness and agility of product and product team regulations

Notes de l'éditeur

  1. In today ’s mobile world enterprises are transforming the way they interact with their customers, partners and employees by implementing mobile strategies that enable them to: Build, connect , and run a growing portfolio of mobile apps for customers, partners and employees Manage and secure mobile applications and data on a variety of mobile devices and operating systems Extend and transform the business to yield new opportunities and business models while extending existing business capabilities to mobile employees, customers, and partners IBM offers a comprehensive set of solutions to meet our customer's mobile requirements so they can seize the opportunities that the mobile world provides while reducing cost and complexity. The IBM Mobile Foundation offering was created to provide an open mobile application platform for developing, deploying, and managing mobile apps. IBM Mobile Foundation delivers a range of app development and management capabilities that support a wide variety of mobile devices and mobile app types, while leveraging existing web technologies skills and investments. The IBM Mobile Foundation family of products includes: IBM Worklight:   to build, run and manage cross-platform mobile apps WebSphere CastIron: to connect mobile apps to a variety of Cloud and back-end systems IBM Endpoint Manager: to control and manage end-user mobile devices
  2. Author Note: Mandatory Rational closing slide (includes appropriate legal disclaimer). Graphic is available in English only.