SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Best practices for mobile enterprise security

Chris Pepin
IBM Global Mobile Offering Manager and Evangelist




                                                    © 2012 IBM Corporation
Mobile is a milestone in the evolution of computing
                                                    Mobile
                                                    & cloud

                                          Web


                 Client
                 server                         @


Mainframe




Source: IBM press release November 2012

2                                                             © 2012 IBM Corporation
Enterprise are faced with multiple mobile challenges



                                  “Consumerization of IT” forcing chief information officers s to have
     Business                      “bring-your-own-device” (BYOD) policy and plan; provide employee–device choice
        and
                                  Anytime, anywhere, any device access now standard
     IT change
                                  Social business interactions are increasingly important


                                  Protection of privacy and confidential information
    Security and                  Policies for client-owned smartphones and tablets
    management
                                  Visibility, security and management of mobile platform requirements


                                  Complexity of multiple device platforms

      Lifecycle                   Unique mobile requirements for employees/workers
     complexity                   Extending data, voice and video applications to mobile devices
                                  Integrating across wired or wireless local area network (LAN) platforms


Source: The New Workplace Chief Information Officer (CIO) Study, IBM Market Insights, October 2011
Review the Flexible Workplace Sellers Assets (Client Presentation, Discussion Guide, and More)
3                                                                                                            © 2012 IBM Corporation
Mobile security is top of mind for today’s CIO’s



                             Advanced mobile security                    76%

                             Application virtualization                  67%

                             Enterprise mobile strategy                  66%

                             Multi-device mobile access                  66%

                             Tablets to augment PCs                      64%

                             Unified communications                      58%




Source: The New Workplace CIO Study, IBM Market Insights, October 2011


4                                                                              © 2012 IBM Corporation
There are multiple mobile security risks to address



 Loss and theft                                                        Malware
                                                                                             In 2011, mobile              Google Android
                                                                                             device users saw             malware grew

                                                                                             155%                         400%
                                                                                             increase in malware          from June 2010 to
1 in 20 mobile devices were stolen                                                           across all platforms.1   .   January 2011.1
in 2010.1


 Spam                                                                  Wi-Fi
                                                                       Wi-Fi hotspot are set to increase

                                                                       350% by 2015
                                                                       provided more opportunities for
                                                                       “man-in-the-middle” attacks.1


70% of mobile device spam
is fraudulent financial services.2
¹Juniper Networks Malicious Mobile Threats Report 2010/2011, May 2011
²GSMA Outlines Findings from Spam Reporting Service Pilot press release, February 10, 2011
5                                                                                                                               © 2012 IBM Corporation
Mobile security involves strategy, policy, education and technology




                               Strategy



                  Education                Policy



                              Technology



6                                                           © 2012 IBM Corporation
The mobile enterprise starts with defining a strategy



 Defining the business problem

 Personas and use cases

 Mobile applications

                                                      Strategy
 Success criteria




         Enterprises need at least two strategies: B2E and B2C
7                                                                © 2012 IBM Corporation
Written corporate mobile policy is essential



 Terms and conditions
    What devices, OS’s and apps are supported
    Passcode, device wipe, allowed applications

 Corporate owned devices

                                                    Policy
 BYOD and data privacy

 Human resources, legal, procurement and
  reimbursement




    A comprehensive policy for PCs, smartphones and tablets is recommended
8                                                               © 2012 IBM Corporation
Technology implements, monitors and enforces corporate policy



 Endpoint management

 Encryption

 Containerization

 Network access                                   Technology

 Anti-malware

 Authentication




          Solutions that support multiple endpoints are recommended
9                                                               © 2012 IBM Corporation
It’s all about the apps!



 Native, web, hybrid, virtual

 Out of the box applications
    Email, contacts, calendar, file sharing, etc.

 Custom applications
    Native SDK                                               Technology
    Mobile Application Platform
    Containerization and application wrapping

 Application management and marketplace




                                   One size doesn’t fit all
10                                                                         © 2012 IBM Corporation
Employees are the weakest link and education is essential



 Identifying cybersecurity threats

 Protecting corporate and client data

 Safeguarding devices

 Data and security incident reporting            Education
 Build a “culture of security”




Published guidelines, online education and social interaction is recommended
11                                                              © 2012 IBM Corporation
IBM CIO has embraced mobile

                                                           IBM's BYOD program "really
     435,000 employees worldwide                          is about supporting
                                                           employees in the way they
                                                           want to work. They will find
                                                           the most appropriate tool to
                                                           get their job done. I want to
     50% of employees work remotely                       make sure I can enable them
                                                           to do that, but in a way that
                                                           safeguards the integrity of our
                                                           business.“
     50% workforce have less than 5 years of service
                                                           - IBM CIO Jeanette Horan



     How did IBM address the challenge?                 Business outcomes
      1.   Deploy a secure technology framework          Increased employee productivity
                                                         Increased employee satisfaction
      2.   Develop a strong usage policy
                                                         Reduced security risk and loss of corporate data
      3.   Educate employees                              for personally owned devices
                                                         Over 120,000 employees using mobile devices for
      4.   Support personally owned devices               business with over 80,000 BYOD
           through social software


12                                                                                            © 2012 IBM Corporation
1
IBM offers products and services to address the complete mobile
lifecycle


                                          Connect to backend systems
                           Build mobile   in support of mobile
                           applications


       Assess and Plan                                 Manage mobile devices
       enterprise mobile                               and applications
       strategy


                                                        Secure your
                                                        mobile business

                   Transform the
              business by creating         Extend existing business
                new opportunities          capabilities to mobile devices




13
13                                                                          © 2012 IBM Corporation
By engaging a services provider, leading businesses accelerate
value from mobile while positioning for long-term success.


                                                                         Benefits resulting from outsourcing

2/3
of chief information officers
                                                                                Free IT staff to focus on other
                                                                                business-critical initiatives
(CIOs) plan to partner
extensively to gain new
skills and expertise
                                                                                 Leverage additional skill sets
                                                                                 as needed


20%
productivity gains and cost
                                                                                Gain in-depth expertise of
                                                                                methodologies and tools
savings experienced by
CIOs who have outsourced
key mobile services
                                                                                Have wider range of mobile
                                                                                activities underway

Source: The New Workplace CIO Study, IBM Market Insights, October 2011
14                                                                                                      © 2012 IBM Corporation
For more information

IBM mobile services
ibm.com/services/mobility

IBM mobile software
ibm.com/software/solutions/mobile-enterprise/

YouTube videos
youtube.com/ibmmobileenterprise




            Follow us on Twitter! @IBMMobile



15                                              © 2012 IBM Corporation
Questions?




16                © 2012 IBM Corporation
17   © 2012 IBM Corporation

Contenu connexe

Plus de Chris Pepin

#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMChris Pepin
 

Plus de Chris Pepin (19)

#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBMID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
ID603: IBM Lotus Notes, IBM Lotus Domino and Collaboration at IBM
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Best practices for mobile enterprise security

  • 1. Best practices for mobile enterprise security Chris Pepin IBM Global Mobile Offering Manager and Evangelist © 2012 IBM Corporation
  • 2. Mobile is a milestone in the evolution of computing Mobile & cloud Web Client server @ Mainframe Source: IBM press release November 2012 2 © 2012 IBM Corporation
  • 3. Enterprise are faced with multiple mobile challenges  “Consumerization of IT” forcing chief information officers s to have Business “bring-your-own-device” (BYOD) policy and plan; provide employee–device choice and  Anytime, anywhere, any device access now standard IT change  Social business interactions are increasingly important  Protection of privacy and confidential information Security and  Policies for client-owned smartphones and tablets management  Visibility, security and management of mobile platform requirements  Complexity of multiple device platforms Lifecycle  Unique mobile requirements for employees/workers complexity  Extending data, voice and video applications to mobile devices  Integrating across wired or wireless local area network (LAN) platforms Source: The New Workplace Chief Information Officer (CIO) Study, IBM Market Insights, October 2011 Review the Flexible Workplace Sellers Assets (Client Presentation, Discussion Guide, and More) 3 © 2012 IBM Corporation
  • 4. Mobile security is top of mind for today’s CIO’s Advanced mobile security 76% Application virtualization 67% Enterprise mobile strategy 66% Multi-device mobile access 66% Tablets to augment PCs 64% Unified communications 58% Source: The New Workplace CIO Study, IBM Market Insights, October 2011 4 © 2012 IBM Corporation
  • 5. There are multiple mobile security risks to address Loss and theft Malware In 2011, mobile Google Android device users saw malware grew 155% 400% increase in malware from June 2010 to 1 in 20 mobile devices were stolen across all platforms.1 . January 2011.1 in 2010.1 Spam Wi-Fi Wi-Fi hotspot are set to increase 350% by 2015 provided more opportunities for “man-in-the-middle” attacks.1 70% of mobile device spam is fraudulent financial services.2 ¹Juniper Networks Malicious Mobile Threats Report 2010/2011, May 2011 ²GSMA Outlines Findings from Spam Reporting Service Pilot press release, February 10, 2011 5 © 2012 IBM Corporation
  • 6. Mobile security involves strategy, policy, education and technology Strategy Education Policy Technology 6 © 2012 IBM Corporation
  • 7. The mobile enterprise starts with defining a strategy  Defining the business problem  Personas and use cases  Mobile applications Strategy  Success criteria Enterprises need at least two strategies: B2E and B2C 7 © 2012 IBM Corporation
  • 8. Written corporate mobile policy is essential  Terms and conditions  What devices, OS’s and apps are supported  Passcode, device wipe, allowed applications  Corporate owned devices Policy  BYOD and data privacy  Human resources, legal, procurement and reimbursement A comprehensive policy for PCs, smartphones and tablets is recommended 8 © 2012 IBM Corporation
  • 9. Technology implements, monitors and enforces corporate policy  Endpoint management  Encryption  Containerization  Network access Technology  Anti-malware  Authentication Solutions that support multiple endpoints are recommended 9 © 2012 IBM Corporation
  • 10. It’s all about the apps!  Native, web, hybrid, virtual  Out of the box applications  Email, contacts, calendar, file sharing, etc.  Custom applications  Native SDK Technology  Mobile Application Platform  Containerization and application wrapping  Application management and marketplace One size doesn’t fit all 10 © 2012 IBM Corporation
  • 11. Employees are the weakest link and education is essential  Identifying cybersecurity threats  Protecting corporate and client data  Safeguarding devices  Data and security incident reporting Education  Build a “culture of security” Published guidelines, online education and social interaction is recommended 11 © 2012 IBM Corporation
  • 12. IBM CIO has embraced mobile IBM's BYOD program "really  435,000 employees worldwide is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to  50% of employees work remotely make sure I can enable them to do that, but in a way that safeguards the integrity of our business.“  50% workforce have less than 5 years of service - IBM CIO Jeanette Horan How did IBM address the challenge? Business outcomes 1. Deploy a secure technology framework  Increased employee productivity  Increased employee satisfaction 2. Develop a strong usage policy  Reduced security risk and loss of corporate data 3. Educate employees for personally owned devices  Over 120,000 employees using mobile devices for 4. Support personally owned devices business with over 80,000 BYOD through social software 12 © 2012 IBM Corporation 1
  • 13. IBM offers products and services to address the complete mobile lifecycle Connect to backend systems Build mobile in support of mobile applications Assess and Plan Manage mobile devices enterprise mobile and applications strategy Secure your mobile business Transform the business by creating Extend existing business new opportunities capabilities to mobile devices 13 13 © 2012 IBM Corporation
  • 14. By engaging a services provider, leading businesses accelerate value from mobile while positioning for long-term success. Benefits resulting from outsourcing 2/3 of chief information officers Free IT staff to focus on other business-critical initiatives (CIOs) plan to partner extensively to gain new skills and expertise Leverage additional skill sets as needed 20% productivity gains and cost Gain in-depth expertise of methodologies and tools savings experienced by CIOs who have outsourced key mobile services Have wider range of mobile activities underway Source: The New Workplace CIO Study, IBM Market Insights, October 2011 14 © 2012 IBM Corporation
  • 15. For more information IBM mobile services ibm.com/services/mobility IBM mobile software ibm.com/software/solutions/mobile-enterprise/ YouTube videos youtube.com/ibmmobileenterprise Follow us on Twitter! @IBMMobile 15 © 2012 IBM Corporation
  • 16. Questions? 16 © 2012 IBM Corporation
  • 17. 17 © 2012 IBM Corporation