SlideShare a Scribd company logo
1 of 33
Download to read offline
© 2013 IBM Corporation
Best Practices for Mobile Enterprise Security and the Importance of
Endpoint Management
Chris Pepin
Mobile Enterprise Executive
IBM Mobile Enterprise Services
Session 1269
@chrispepin
cpepin@us.ibm.com
22 © 2013 IBM Corporation
Mobile enterprise is a business imperative
• Turn mobile into a profit-generating
platform and attract new customers
• Improve employee productivity, attract
and retain top talent
• Enterprises that don’t embrace mobile risk
being left behind
• Social, cloud and analytics compliment
mobile
33 © 2013 IBM Corporation
Mobile security risks are significant…
Frequency
Never Rare Often Frequently
LimitedMassive
Loss/Theft/
Seizure
Based on Gartner, Mobile Security Risks, interviews with members of ISS
xForce, and Corporate Executive Board. e.g. Industry (not IBM only) view
Blue Tooth
Slurping
Man in the
Middle
Attack
Impact
III
IIIIV
Roving
Bug/Illegal
Malware/
Spyware/
Grayware
Location
Logging &
Tracking
44 © 2013 IBM Corporation
…and involve more than just the device
Manage device
Set appropriate security
policies • Register •
Compliance • Wipe • Lock
Secure Data
Data separation •
Leakage • Encryption
Application
Security
Offline authentication •
Application level controls
Secure Access
Properly identify mobile
users and devices • Allow
or deny access •
Connectivity
Monitor & Protect
Identify and stop mobile
threats •
Log network access,
events, and anomalies
Secure
Connectivity
Secure Connectivity from
devices
Secure Application
Utilize secure coding
practices • Identify
application vulnerabilities •
Update applications
Integrate Securely
Secure connectivity to
enterprise applications and
services
Manage
Applications
Manage applications and
enterprise app store
Device Network Mobile Applications
55 © 2013 IBM Corporation
Video
IBM Mobile Security - Confidently enable productivity, business agility and
a rich user experience
http://www.youtube.com/watch?v=jTaLpb96ims
66 © 2013 IBM Corporation
• Application sandboxing
• Signed code controls
• Remote device or data wipe
IBM prediction
Mobile computing devices should be more
secure than traditional user computing
devices by 2014”
77 © 2013 IBM Corporation
A four-pronged approach to mobile security
Strategy
PolicyEducation
Technology
88 © 2013 IBM Corporation
A mobile enterprise starts with a strategy
• Defining the business problem and success criteria
• Personas and use cases
• Mobile infrastructure readiness
• Processes and governance model
Strategy
Enterprises need at least two strategies: B2E and B2C
99 © 2013 IBM Corporation
Written mobile policy is essential
• Terms and conditions
‒ What devices, OS’s and versions are
allowed
‒ Passcode, device wipe, allowed
applications
• Corporate owned devices as well as
BYOD; data privacy
• Human resources, legal, procurement
and reimbursement
Policy
A comprehensive policy for PCs, smartphones and tablets is recommended
1010 © 2013 IBM Corporation
Employees are the weakest security link
• Identifying cybersecurity threats
• Protecting corporate and client data
• Safeguarding devices
• Data and security incident reporting
• Build a “culture of security”
Published guidelines, online education and social interaction is recommended
Education
1111 © 2013 IBM Corporation
Technology monitors and enforces security policy
• Mobile Device Management (MDM)
• Data Loss Prevention (DLP)
• Containerization, virtualization, encryption
• Anti-malware
• Network access control
One size doesn’t fit all
Technology
1212 © 2013 IBM Corporation
Usertype
Manager
Regular Employee
I.T. Staff
Contractor
Guest
CorporateLaptop
PersonalLaptop
iPad/iPhone
AndroidDevice
Internet + Email + Intranet
Internet + Email
Internet only
In addition to restricting
access based on user and
device type, additional
conditions may also be
leveraged such as:
 Access method (wired,
wireless, or VPN
 Access location
(company premises,
home office, or remote
location)
 Application type (data,
voice, video)
Network access policy is the first line of defense
1313 © 2013 IBM Corporation
Onboard Device 1
A simple and intuitive method of on-boarding the device.
Automatically provisioning the device’s settings and checking to
make sure the device hasn’t be compromised in any way or
present any risk.
Invoke a policy2
Automatic policy decisions
and enablement.
Taking in all of the
information about the context
of the user and device and
enabling the appropriate
policy.
Unified policy enforcement.
Apply the policy across the
global organization, over
wired, wireless and remote,
and across all of the major
mobile device operating
systems.
Enforce policy 3
Network access control workflow
1414 © 2013 IBM Corporation
Do I have enough
IP addresses?
IP Address Management (IPAM)
 Many enterprises are still managing the IP address space on their networks
manually via spreadsheets (approximately 75%), via homegrown
applications or a combination of the two1
 Existing subnets and IP address pools may not be sufficiently large to
handle the increased number of connected devices
 Audit and tracking capabilities need to be enhanced for mobile devices
Will my DHCP
services scale?
Dynamic Host Configuration Protocol (DHCP)
 Increased scale and robustness is required to handle the influx of IP
address requests
 New mechanisms for dynamically managing lease times and IP address re-
use may be required
Is my DNS ready
to support the
cloud?
Domain Name System (DNS)
 Mobile applications and cloud-based services will impose a massive
increase in the use of DNS services
Network impact of mobile devices
1515 © 2013 IBM Corporation
Enterprise Needs:
 Protect corporate applications and data, not just the device
 Prevent data leakage from enterprise apps to personal apps and
public cloud-based services
 Enforce advanced security features such as file-level encryption
 Centrally administer and enforce permissions and policies
 Ability to remotely wipe all work-related applications and data
Personal Needs:
 Maintain full control over personal apps and data
 Enterprise policies do not apply when the device is not connected
to the enterprise network and corporate applications are not in use
 Selective wipe ensures that personal data remains untouched
 Simple to switch between personal and work functions
Separating personal and work data
1616 © 2013 IBM Corporation
Virtualized Devices &
Virtual Desktop Infrastructure (VDI)
Mobile Device Management Secure Container
MDM
Enterprise
Container
Management
Server
Enterprise
Device
Personal
Device
 Manage device security
policies (password,
encryption, etc.)
 MDM controls enterprise
access (WIFI / VPN / email)
 Wipe and “selective wipe”
enterprise data and apps
 Create a “secure container”
 Replace the default mail /
calendar / contacts
 Allow organizations to write
apps that run in the
container; encryption
 Virtualize the device OS
 Create a virtualized
“enterprise device” and
“personal device”
 Virtual Enterprise Desktop
 Virtual application delivery
Enterprise
Desktop
Multiple approaches to achieving data separation
1717 © 2013 IBM Corporation
Virtualized applications
Storage
Servers
VDI Infrastructure
Virtual application streaming
Virtual application streaming approach
Pros: No on device storage of confidential data, access to legacy applications
Cons: No offline access, end-user experience
1818 © 2013 IBM Corporation
Mobile Enterprise Management solutions
• Moving beyond Mobile Device Management (MDM)
• Microsoft Exchange ActiveSync is NOT the answer
• Connected cloud and on-premise solutions
• What devices do I need to manage?
• What features do I need?
1919 © 2013 IBM Corporation
IBM is a mobile enterprise
• 435,000 employees worldwide; 50%
mobile
• BYOD isn’t new at IBM and includes
smartphone, tablets as well as
laptops
• 120,000 employees leveraging
smartphones and tablets; 80,000
BYOD
• 600,000 managed laptops/desktops;
30,000 BYOD
IBM's BYOD program
"really is about supporting
employees in the way they
want to work. They will
find the most appropriate
tool to get their job done. I
want to make sure I can
enable them to do that, but
in a way that safeguards
the integrity of our
business.“
- IBM CIO Jeanette Horan
2020 © 2013 IBM Corporation
Video
IBM Mobile Technology – A Personal Journey
http://www.youtube.com/watch?v=0sEaLyLjFag
2121 © 2013 IBM Corporation
Mobile @ IBM
• Legal
Personally owned device terms
and conditions
• Policy
Same overriding security policy for
all endpoints (laptop, mobile, other)
• Technical controls
Detailed security settings per
platform (“techspecs”)
 Formal
Mandatory Digital IBMer Security
Training
 Casual
IBM Secure Computing Guidelines
Targeted w3 articles
 Social
Secure Computing Forum
Secure Computing Blog Posts
 Developer
Secure Engineering guidelines
Mobile app security guidelines
 Endpoint Management
(overall control)
 Anti-malware
(malicious app protection)
 Network access control
& Application level security
(data protection)
 Containerization / Virtualization
(data protection, data privacy, end user acceptance)
 Mobile as primary
 Personas
(13 inside IBM)
 BYOD policy
(Windows, Linux, Mac, smartphones, tablets)
2222 © 2013 IBM Corporation
Key mobile technology in use inside IBM
• IBM Endpoint Manager
• IBM Lotus Notes Traveler
• BlackBerry Enterprise Server
• IBM Sametime Mobile
• IBM Connections Mobile
• IBM Worklight
• IBM Mobile Connect
Technology
2323 © 2013 IBM Corporation
IBM Endpoint Manager
Endpoints
Patch
Management
Lifecycle
Management
Software Use
Analysis
Power
Management
Mobile
Devices
Security and
Compliance
Core
Protection
Desktop / laptop / server endpoint Mobile Purpose specific
Systems Management Security Management
Server
Automation
Continuously monitor the health and security of all enterprise computers in real-
time via a single, policy-driven agent
2424 © 2013 IBM Corporation
IBM Endpoint Manager components
Single intelligent agent
• Continuous self-assessment
• Continuous policy enforcement
• Minimal system impact (<2% CPU, <10MB RAM)
Single server and console
• Highly secure, highly available
• Aggregates data, analyzes and reports
• Manages up to 250K endpoints per server
Flexible policy language (Fixlets)
• Thousands of out-of-the-box policies
• Best practices for operations and security
• Simple custom policy authoring
• Highly extensible/applicable across all platforms
Virtual infrastructure
• Designate IBM Endpoint Manager agent as a relay
or discovery point in minutes
• Provides built-in redundancy
• Leverages existing systems/shared infrastructure
2525 © 2013 IBM Corporation
Endpoint Management
Systems
Management
Security
Management
Common agent
Unified console
Single
management
server
Managed = Secure
Desktops, Laptops,
& Servers
Smartphones
& Tablets
Purpose-specific
Endpoints
Implement BYOD with
confidence
Secure sensitive data,
regardless of device
Handle multi-platform
complexities with ease
Minimize administration
costs
IBM Endpoint Manager addresses key business needs
2626 © 2013 IBM Corporation
Benefits of IBM Endpoint Manager
 “Organizations…would prefer to use the same tools across PCs, tablets and smartphones,
because it's increasingly the same people who support those device types”
– Gartner, PCCLM Magic Quadrant, January 2011
 Although at some level mobile is unique, the devices are just another form of endpoints in your
infrastructure. This means whichever technologies you procure should have a road map for
integration into your broader endpoint protection strategy.
– Forrester, Market Overview: Mobile Security, Q4, 2011
Reduces Hardware &
Administration Costs
• “Single pane” for mobile
devices, laptops, desktops,
and servers
• Single Endpoint Manager
Server scales to 250,000+
devices
• Unified
infrastructure/administration
model reduces FTE
requirements
Fast Time-to-Value
• Enterprise-grade APIs
enable integration with
service desks, CMDBs, etc
(Integrated Service
Management)
• Cloud-based content
delivery model allows for
rapid updates with no
software upgrade or
installation required
2727 © 2013 IBM Corporation
What’s New in IBM Endpoint Manager?
Integration with Enterproid’s Divide container technologies
for iOS and Android
Web-based administration console for performing basic
device management tasks with role-based access control
Integration with BlackBerry Enterprise Server for integrated
support of BlackBerry v4 – v7 devices
Enhanced security with support for FIPS 140-2 encryption
and bi-directional encryption of communications with
Android agent
IBM Endpoint Manager’s cloud-based content delivery system enables customers to benefit from frequent
feature enhancements without the difficulty of performing upgrades
2828 © 2013 IBM Corporation
Application Security Objectives
IBM Worklight Security
Application Security Design
• Develop secure mobile apps using
corporate best practices
• Encrypted local storage for data
• Offline user access
• Challenge response on startup
• App authenticity validation
• Direct Update of application
• Remote disable (of applications per
device and version)
• Enforcement of organizational
security policies
2929 © 2013 IBM Corporation
Key messages
• There are mobile security challenges
but there are also solutions
• Endpoint management is a required
component but not the only solution you
will need
• There are no one size-fits-all mobile
solutions
• The mobile landscape continues to
evolve – be flexible and embrace
change
3030 © 2013 IBM Corporation
1 Learn more:
ibm.com/mobilefirst
Sign up for the IBM Mobile workshop
Email us at -- IBMMobile@us.ibm.com
2
3
Join the conversation:
twitter.com/IBMMobile (#IBMMobile)
facebook.com/IBMMobile
Three ways to get started with MobileFirst
3131 © 2013 IBM Corporation
Questions?
Chris Pepin
Mobile Enterprise Executive
IBM Global Technology Services
cpepin@us.ibm.com
@chrispepin
3232 © 2013 IBM Corporation
3333 © 2013 IBM Corporation
Legal Disclaimer
• © IBM Corporation 2013. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
you will result in any specific sales, revenue growth or other results.

More Related Content

What's hot

Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 

What's hot (20)

Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 

Viewers also liked

Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Computación básica
Computación básicaComputación básica
Computación básicadeyipaola
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
How to lead a large organization through agile transformation bodhi choudhuri
How to lead a large organization through agile transformation bodhi choudhuriHow to lead a large organization through agile transformation bodhi choudhuri
How to lead a large organization through agile transformation bodhi choudhuriBodhi Choudhuri
 
How-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability RemediationHow-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability RemediationDenim Group
 

Viewers also liked (11)

Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Computación básica
Computación básicaComputación básica
Computación básica
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
How to lead a large organization through agile transformation bodhi choudhuri
How to lead a large organization through agile transformation bodhi choudhuriHow to lead a large organization through agile transformation bodhi choudhuri
How to lead a large organization through agile transformation bodhi choudhuri
 
S M Picasso
S M PicassoS M Picasso
S M Picasso
 
How-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability RemediationHow-To-Guide for Software Security Vulnerability Remediation
How-To-Guide for Software Security Vulnerability Remediation
 
Absolut Vodka (V M )
Absolut Vodka (V M )Absolut Vodka (V M )
Absolut Vodka (V M )
 

Similar to Best Practices for Mobile Enterprise Security and Endpoint Management

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 

Similar to Best Practices for Mobile Enterprise Security and Endpoint Management (20)

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 

More from Chris Pepin

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesChris Pepin
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at homeChris Pepin
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Chris Pepin
 

More from Chris Pepin (20)

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at home
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

Best Practices for Mobile Enterprise Security and Endpoint Management

  • 1. © 2013 IBM Corporation Best Practices for Mobile Enterprise Security and the Importance of Endpoint Management Chris Pepin Mobile Enterprise Executive IBM Mobile Enterprise Services Session 1269 @chrispepin cpepin@us.ibm.com
  • 2. 22 © 2013 IBM Corporation Mobile enterprise is a business imperative • Turn mobile into a profit-generating platform and attract new customers • Improve employee productivity, attract and retain top talent • Enterprises that don’t embrace mobile risk being left behind • Social, cloud and analytics compliment mobile
  • 3. 33 © 2013 IBM Corporation Mobile security risks are significant… Frequency Never Rare Often Frequently LimitedMassive Loss/Theft/ Seizure Based on Gartner, Mobile Security Risks, interviews with members of ISS xForce, and Corporate Executive Board. e.g. Industry (not IBM only) view Blue Tooth Slurping Man in the Middle Attack Impact III IIIIV Roving Bug/Illegal Malware/ Spyware/ Grayware Location Logging & Tracking
  • 4. 44 © 2013 IBM Corporation …and involve more than just the device Manage device Set appropriate security policies • Register • Compliance • Wipe • Lock Secure Data Data separation • Leakage • Encryption Application Security Offline authentication • Application level controls Secure Access Properly identify mobile users and devices • Allow or deny access • Connectivity Monitor & Protect Identify and stop mobile threats • Log network access, events, and anomalies Secure Connectivity Secure Connectivity from devices Secure Application Utilize secure coding practices • Identify application vulnerabilities • Update applications Integrate Securely Secure connectivity to enterprise applications and services Manage Applications Manage applications and enterprise app store Device Network Mobile Applications
  • 5. 55 © 2013 IBM Corporation Video IBM Mobile Security - Confidently enable productivity, business agility and a rich user experience http://www.youtube.com/watch?v=jTaLpb96ims
  • 6. 66 © 2013 IBM Corporation • Application sandboxing • Signed code controls • Remote device or data wipe IBM prediction Mobile computing devices should be more secure than traditional user computing devices by 2014”
  • 7. 77 © 2013 IBM Corporation A four-pronged approach to mobile security Strategy PolicyEducation Technology
  • 8. 88 © 2013 IBM Corporation A mobile enterprise starts with a strategy • Defining the business problem and success criteria • Personas and use cases • Mobile infrastructure readiness • Processes and governance model Strategy Enterprises need at least two strategies: B2E and B2C
  • 9. 99 © 2013 IBM Corporation Written mobile policy is essential • Terms and conditions ‒ What devices, OS’s and versions are allowed ‒ Passcode, device wipe, allowed applications • Corporate owned devices as well as BYOD; data privacy • Human resources, legal, procurement and reimbursement Policy A comprehensive policy for PCs, smartphones and tablets is recommended
  • 10. 1010 © 2013 IBM Corporation Employees are the weakest security link • Identifying cybersecurity threats • Protecting corporate and client data • Safeguarding devices • Data and security incident reporting • Build a “culture of security” Published guidelines, online education and social interaction is recommended Education
  • 11. 1111 © 2013 IBM Corporation Technology monitors and enforces security policy • Mobile Device Management (MDM) • Data Loss Prevention (DLP) • Containerization, virtualization, encryption • Anti-malware • Network access control One size doesn’t fit all Technology
  • 12. 1212 © 2013 IBM Corporation Usertype Manager Regular Employee I.T. Staff Contractor Guest CorporateLaptop PersonalLaptop iPad/iPhone AndroidDevice Internet + Email + Intranet Internet + Email Internet only In addition to restricting access based on user and device type, additional conditions may also be leveraged such as:  Access method (wired, wireless, or VPN  Access location (company premises, home office, or remote location)  Application type (data, voice, video) Network access policy is the first line of defense
  • 13. 1313 © 2013 IBM Corporation Onboard Device 1 A simple and intuitive method of on-boarding the device. Automatically provisioning the device’s settings and checking to make sure the device hasn’t be compromised in any way or present any risk. Invoke a policy2 Automatic policy decisions and enablement. Taking in all of the information about the context of the user and device and enabling the appropriate policy. Unified policy enforcement. Apply the policy across the global organization, over wired, wireless and remote, and across all of the major mobile device operating systems. Enforce policy 3 Network access control workflow
  • 14. 1414 © 2013 IBM Corporation Do I have enough IP addresses? IP Address Management (IPAM)  Many enterprises are still managing the IP address space on their networks manually via spreadsheets (approximately 75%), via homegrown applications or a combination of the two1  Existing subnets and IP address pools may not be sufficiently large to handle the increased number of connected devices  Audit and tracking capabilities need to be enhanced for mobile devices Will my DHCP services scale? Dynamic Host Configuration Protocol (DHCP)  Increased scale and robustness is required to handle the influx of IP address requests  New mechanisms for dynamically managing lease times and IP address re- use may be required Is my DNS ready to support the cloud? Domain Name System (DNS)  Mobile applications and cloud-based services will impose a massive increase in the use of DNS services Network impact of mobile devices
  • 15. 1515 © 2013 IBM Corporation Enterprise Needs:  Protect corporate applications and data, not just the device  Prevent data leakage from enterprise apps to personal apps and public cloud-based services  Enforce advanced security features such as file-level encryption  Centrally administer and enforce permissions and policies  Ability to remotely wipe all work-related applications and data Personal Needs:  Maintain full control over personal apps and data  Enterprise policies do not apply when the device is not connected to the enterprise network and corporate applications are not in use  Selective wipe ensures that personal data remains untouched  Simple to switch between personal and work functions Separating personal and work data
  • 16. 1616 © 2013 IBM Corporation Virtualized Devices & Virtual Desktop Infrastructure (VDI) Mobile Device Management Secure Container MDM Enterprise Container Management Server Enterprise Device Personal Device  Manage device security policies (password, encryption, etc.)  MDM controls enterprise access (WIFI / VPN / email)  Wipe and “selective wipe” enterprise data and apps  Create a “secure container”  Replace the default mail / calendar / contacts  Allow organizations to write apps that run in the container; encryption  Virtualize the device OS  Create a virtualized “enterprise device” and “personal device”  Virtual Enterprise Desktop  Virtual application delivery Enterprise Desktop Multiple approaches to achieving data separation
  • 17. 1717 © 2013 IBM Corporation Virtualized applications Storage Servers VDI Infrastructure Virtual application streaming Virtual application streaming approach Pros: No on device storage of confidential data, access to legacy applications Cons: No offline access, end-user experience
  • 18. 1818 © 2013 IBM Corporation Mobile Enterprise Management solutions • Moving beyond Mobile Device Management (MDM) • Microsoft Exchange ActiveSync is NOT the answer • Connected cloud and on-premise solutions • What devices do I need to manage? • What features do I need?
  • 19. 1919 © 2013 IBM Corporation IBM is a mobile enterprise • 435,000 employees worldwide; 50% mobile • BYOD isn’t new at IBM and includes smartphone, tablets as well as laptops • 120,000 employees leveraging smartphones and tablets; 80,000 BYOD • 600,000 managed laptops/desktops; 30,000 BYOD IBM's BYOD program "really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business.“ - IBM CIO Jeanette Horan
  • 20. 2020 © 2013 IBM Corporation Video IBM Mobile Technology – A Personal Journey http://www.youtube.com/watch?v=0sEaLyLjFag
  • 21. 2121 © 2013 IBM Corporation Mobile @ IBM • Legal Personally owned device terms and conditions • Policy Same overriding security policy for all endpoints (laptop, mobile, other) • Technical controls Detailed security settings per platform (“techspecs”)  Formal Mandatory Digital IBMer Security Training  Casual IBM Secure Computing Guidelines Targeted w3 articles  Social Secure Computing Forum Secure Computing Blog Posts  Developer Secure Engineering guidelines Mobile app security guidelines  Endpoint Management (overall control)  Anti-malware (malicious app protection)  Network access control & Application level security (data protection)  Containerization / Virtualization (data protection, data privacy, end user acceptance)  Mobile as primary  Personas (13 inside IBM)  BYOD policy (Windows, Linux, Mac, smartphones, tablets)
  • 22. 2222 © 2013 IBM Corporation Key mobile technology in use inside IBM • IBM Endpoint Manager • IBM Lotus Notes Traveler • BlackBerry Enterprise Server • IBM Sametime Mobile • IBM Connections Mobile • IBM Worklight • IBM Mobile Connect Technology
  • 23. 2323 © 2013 IBM Corporation IBM Endpoint Manager Endpoints Patch Management Lifecycle Management Software Use Analysis Power Management Mobile Devices Security and Compliance Core Protection Desktop / laptop / server endpoint Mobile Purpose specific Systems Management Security Management Server Automation Continuously monitor the health and security of all enterprise computers in real- time via a single, policy-driven agent
  • 24. 2424 © 2013 IBM Corporation IBM Endpoint Manager components Single intelligent agent • Continuous self-assessment • Continuous policy enforcement • Minimal system impact (<2% CPU, <10MB RAM) Single server and console • Highly secure, highly available • Aggregates data, analyzes and reports • Manages up to 250K endpoints per server Flexible policy language (Fixlets) • Thousands of out-of-the-box policies • Best practices for operations and security • Simple custom policy authoring • Highly extensible/applicable across all platforms Virtual infrastructure • Designate IBM Endpoint Manager agent as a relay or discovery point in minutes • Provides built-in redundancy • Leverages existing systems/shared infrastructure
  • 25. 2525 © 2013 IBM Corporation Endpoint Management Systems Management Security Management Common agent Unified console Single management server Managed = Secure Desktops, Laptops, & Servers Smartphones & Tablets Purpose-specific Endpoints Implement BYOD with confidence Secure sensitive data, regardless of device Handle multi-platform complexities with ease Minimize administration costs IBM Endpoint Manager addresses key business needs
  • 26. 2626 © 2013 IBM Corporation Benefits of IBM Endpoint Manager  “Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types” – Gartner, PCCLM Magic Quadrant, January 2011  Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. – Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs • “Single pane” for mobile devices, laptops, desktops, and servers • Single Endpoint Manager Server scales to 250,000+ devices • Unified infrastructure/administration model reduces FTE requirements Fast Time-to-Value • Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) • Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required
  • 27. 2727 © 2013 IBM Corporation What’s New in IBM Endpoint Manager? Integration with Enterproid’s Divide container technologies for iOS and Android Web-based administration console for performing basic device management tasks with role-based access control Integration with BlackBerry Enterprise Server for integrated support of BlackBerry v4 – v7 devices Enhanced security with support for FIPS 140-2 encryption and bi-directional encryption of communications with Android agent IBM Endpoint Manager’s cloud-based content delivery system enables customers to benefit from frequent feature enhancements without the difficulty of performing upgrades
  • 28. 2828 © 2013 IBM Corporation Application Security Objectives IBM Worklight Security Application Security Design • Develop secure mobile apps using corporate best practices • Encrypted local storage for data • Offline user access • Challenge response on startup • App authenticity validation • Direct Update of application • Remote disable (of applications per device and version) • Enforcement of organizational security policies
  • 29. 2929 © 2013 IBM Corporation Key messages • There are mobile security challenges but there are also solutions • Endpoint management is a required component but not the only solution you will need • There are no one size-fits-all mobile solutions • The mobile landscape continues to evolve – be flexible and embrace change
  • 30. 3030 © 2013 IBM Corporation 1 Learn more: ibm.com/mobilefirst Sign up for the IBM Mobile workshop Email us at -- IBMMobile@us.ibm.com 2 3 Join the conversation: twitter.com/IBMMobile (#IBMMobile) facebook.com/IBMMobile Three ways to get started with MobileFirst
  • 31. 3131 © 2013 IBM Corporation Questions? Chris Pepin Mobile Enterprise Executive IBM Global Technology Services cpepin@us.ibm.com @chrispepin
  • 32. 3232 © 2013 IBM Corporation
  • 33. 3333 © 2013 IBM Corporation Legal Disclaimer • © IBM Corporation 2013. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.