SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Institute a Mobile First IT Infrastructure
Plan, integrate, optimize and manage IT and communications
infrastructures to securely deploy mobile
Vijay Dheap, Global Solutions Manager - Big Data Security Intelligence & Mobile Security
Chris Pepin, Global Services Executive, IBM MobileFirst
© 2013 IBM Corporation
@chrispepin
2#IBMINTERCONNECT
Current trends in the mobile marketplace
1 http://techcrunch.com/2012/02/14/the-number-of-mobile-devices-will-exceed-worlds-population-by-2012-other-shocking-figures
3 http://newsroom.fb.com/content/default.aspx?NewsAreaId=22
Number of mobile-
connected devices
to surpass human
population by 2016
1
Device
Explosion Corporate IT
embracing the
need to implement
a strong Mobile
security policy
Compliance
1B+ monthly
Facebook users
3
680M monthly FB
mobile users
3
Social
Evolving workplace
Work any place/ any
time
Mobile device
proliferation – form
factor, platform,
services
BYOD
Device consistency
Greater adoption of
User/device
authentication and
single sign-on
Data
Separation
Increasing need for
Application
Vulnerability testing
and certification.
Encryption of data
within an application
Applications
3#IBMINTERCONNECT
• Infrastructure complexity from multiple device platforms
• Unique mobile requirements for employees/workers
• Extending data, voice and video applications to mobile devices
• Integrating across wireline/wireless LAN platforms
• “Consumerization of IT” forcing CIOs to have BYOD policy and
plan; provide employee device choice
• Anytime, anywhere, any device access now standard
• Social business interactions are increasingly important
These trends bring business and IT challenges
•Business and IT
change
•Security and
management
• Protection of privacy and confidential information
• Policies for client-owned smartphones and tablets
• Visibility, security and management of mobile platform
requirements
•Complexity and
integration
Business and IT
Change
Security and
Management
Complexity and
Integration
4#IBMINTERCONNECT
Create new value
at the moment
of awareness
Develop and run
applications
Connect
with customers
in context
Integrate mobile
into the fabric
of the organization
Mobile enterprises are taking an integrated
approach to putting their business in motion
5#IBMINTERCONNECT
The Mobile First enterprise integrates mobile
capabilities into the fabric of the organization
They are
enabling BYOD
Findings from the Institute for Business Value & Oxford Economics offer insight into the practices of mobile leaders
They are detecting
threats from mobile
before they impact
the enterprise
They are
prioritizing data
& analytics
82% of mobile
strategy leaders said
that they were
successful with mobile
threat detection vs
50% of other
respondents
70% of leaders placed
investments in data
storage, data
management and
analytics as a high
priority, versus <45%
of other respondents
79% of mobile
strategy leaders
have a well
documented policy
in place for BYOD vs
48% of other
respondents
They are
expanding their
network
infrastructures
80% of leaders say
their current
wireless network
performance meets
the organization's
needs vs. 48% of
other respondents
6#IBMINTERCONNECT
The way forward to optimize your infrastructure
Plan, integrate, optimize & manage IT and communication
infrastructures to securely deploy mobile to enable growth
and further competitive differentiation
View mobility as a critical business enabler for
future growth and competitive differentiation
3
1
2 Prioritize infrastructure to support mobile and
address it strategically as part of their enterprise
7#IBMINTERCONNECT
For clients who need to:
 Develop new mobile applications
 Integrate mobile applications with enterprise IT systems
 Manage and secure mobile environments
 Maintain visibility, control and automation of mobile devices
IBM MobileFirst Development & Integration Services
Key offerings:
 IBM Mobile Application
Platform Management
Services
 IBM Mobility & Wireless
Services
IBM MobileFirst Development & Integration Services offer:
 Fast cycle development of mobile applications across
platforms
 Mobile app integration for seamless connectivity and data
management
 Secure and seamless wired, wireless, cellular and WiFi
network access including increased network bandwidth
required for voice, data and video
 Secure mobile device and application management
8#IBMINTERCONNECT
 Support for both enterprise and consumer
mobile applications across multiple device
types
 Mobile application integration for seamless
connectivity and data management
 Faster development and better lifecycle
management of mobile applications across
platforms
 A fully managed service which enables the
rapid deployment and configuration of a
single mobile application platform without
requiring an investment on in-house skills
 Management and control over the deployment
of mobile applications and data
IBM Mobile Application Platform Management
Extend existing applications to mobile devices while limiting IT investment and expenses
Mobile Application Platform
9#IBMINTERCONNECT
 Security-rich access to support mobile
collaboration and BYOD policies
 Robust infrastructures and mobile connectivity
as a foundation to help support mobile and
remote workers
 Identification of security threats and
application of best-practice design and tools
to automatically contain those threats
 Consolidated infrastructure to help support
network application services: voice, video and
data communications
IBM Mobility and Wireless Services
Integrated IT network access, management and security to support mobile environments
Voice
Mobile
collaboration
Location
awareness
Intelligent
messaging
Video
Data and
web access
Enterprise
mobility
10#IBMINTERCONNECT
Westfalen Weser Energie simplifies device maintenance
and error diagnostics with remote management
Challenges
Combat unauthorized access and damage at
the utility’s relay stations, resolve disruptions on
the ground more quickly, and provide better
support for mobile service technicians.
Solution
As part of a joint project involving Cisco, IBM,
and Intel, Westfalen utilizes special Cisco IP
cameras, a back-end server platform based on
Intel® Xeon® processors, and Intelligent Video
Analytics software from IBM to assess
recordings made in the field. IBM also
configured outdoor WLAN access points at the
technology centers and relay stations to ensure
mobile employees are readily contactable.
Benefits
• Better protection of relay stations against theft
and unauthorized access.
• Simplified visual inspections of equipment
and faster response in the event of a fault.
• Mobile video conferencing connects specialist
experts from the control room with service
technicians on the ground.
“A major consideration was the need to
improve communication between the service
technicians on the ground and executives in
the control centers.”
Reimar Süß, Project Manager,
Westfalen Weser Energie
11#IBMINTERCONNECT
Devices Network, Data,
and Access
Applications
Manage & Secure
Corporate Devices,
BYOD
Achieve Visibility and
Adaptive Policy
Management
Securely & Efficiently
Develop, Test, Deploy,
and Manage
IBM MobileFirst’s approach to mobile
management and security
Security Intelligence
Service Desk & Self Service
12#IBMINTERCONNECT
IBM MobileFirst Management offers:
 Unified management across devices
 Selective wipe of corporate data
 Configuration & enforcement of password policies, encryption,
VPN access & camera use
 Streamlined workflow between development & operations with
an integrated Enterprise App Store
 Optimize telecom expenses with detailed usage analyses
 End-user portal for management of mobile equipment, carrier
plans, and usage tracking
 On-premises or managed service delivery
For clients who need to:
 Implement BYOD with confidence
 Manage secure sensitive data, regardless of the device
 Manage, track and optimize mobile expenses
 Handle multi-platform complexities with ease
IBM MobileFirst Management
Key offerings:
 IBM Endpoint Manager
for mobile devices
 IBM Mobile Enterprise
Services for managed
mobility
13#IBMINTERCONNECT
IBM Endpoint Manager for mobile devices
Single console management and security of ALL employee devices
What’s new in IBM Endpoint Manager for Mobile Devices V2.2
 Deployment, configuration, and management of multiple 3rd party container technologies
 Increased security at both the network access and app layers through integration with
Cisco ISE and IBM Worklight
 Unified device management bringing
together mobile devices, desktops, and
servers
 Integrated management of containerization
technologies to support BYOD
 Deployment and management of apps,
including integrated transfers from Worklight
 Single-device views and near-real time data
integrated with Service Desk and CMDB
 Self-service portal for locating and securing
lost devices
14#IBMINTERCONNECT
St. Vincents Health Australia unifies management of mobile
devices, desktops, and servers
Challenges
With a diverse set of around 6,500 academic,
medical practitioner and administrative users, the IT
team must provide access to the latest technologies
while protecting patient privacy across servers,
desktops, and mobile devices.
Solution
Using IBM Endpoint Manager, built on BigFix
technology, Sydney based hospitals with the St
Vincents Health Australia group, has a single
solution for patch management, configuration
compliance, power management, lifecycle
management, remote desktop, software usage
reporting, and mobile device management.
Benefits
• Visibility and control over 100 percent of endpoints
• Significantly mitigated data privacy risk exposure
• Freed up IT staff to execute additional strategic
projects
• Realized cost savings through PC power
management and the elimination of software
licenses
• Simplify email, application, inventory, and
configuration management on mobile devices
“We now have a rich systems remediation platform
from which to deploy endpoint security. Once we
discovered the power management and application
deployment capabilities, we knew we had found the
complete solution we were looking for.”
~Peter Param,
IT Security Manager, St Vincents Health Australia
15#IBMINTERCONNECT
 Comprehensive management of mobile
environments including set up, transition,
ongoing operations and management
 Apple iOS, Google Android, BlackBerry®,
Microsoft Windows Mobile smartphones,
tablets and rugged devices acquired,
distributed and managed for you with
subscription-based pricing
 Deployment of mobile applications across
the organization to boost productivity
 Secure corporate data and enhance
compliance and consistency with
centralized management, self service
portal and service desk
 Leverage mobile email as critical
enterprise tool
Mobile Enterprise Services for managed mobility
Tackle complexity, risk and costs in highly dynamic mobile IT infrastructures
16#IBMINTERCONNECT
Kochi Medical School Hospital improves care quality
while cutting costs using Mobile Enterprise Services
Challenges
The hospital wanted to update its mobile
environment to improve care quality, medical staff
productivity and operating cost reduction.
Solution
IBM helped the hospital to restructure its
architecture to take advantage of Apple iPod
Touch devices, offering a more intuitive user
interface, lower maintenance costs and a broader
range of applications. IBM also migrated the
school’s existing medical applications and patient
record systems to the IBM SmarterCloud Desktop
platform.
Benefits
 Lower per-device expense helps reduce
maintenance costs and equip a larger pool of
employees
 Improved patient care coordination and
increased efficiency by extending access to
critical medical systems
 Cloud based architecture maintains a security-
rich environment for medical information which
extends to, but is not stored on, mobile devices
“We wanted to improve the productivity for our
medical staff to access the patient records at any time,
at any place in our hospital securely by mobile
devices. IBM knew how to make that happen cost-
effectively and without compromising the security of
patient records.”
Mr. Yoshiyasu Okuhara, Professor and Director,
Center of Medical Information Science,
Kochi Medical School Hospital
17#IBMINTERCONNECT
Why take an integrated approach to mobile
security?
Speed time to deployment of enterprise
mobile apps and updates, while improving quality
Improve WiFi network management for greater reliability,
employee productivity, and minimize business interruptions
Enhance end-to-end security to help prevent loss of
intellectual property and regulated data
Less total infrastructure for lower hardware, admin costs
Reduce help desk calls, device and service lifecycle
costs
18#IBMINTERCONNECT
IBM MobileFirst Security offers:
 Context aware risk – based access control
 Mobile threat protection
 Strong session management & Single Sign–on
 Vulnerability analysis for mobile apps
 Visibility and analysis of security events from the
device, network, user end app behavior
For clients who need to:
 Protect devices and data
 Defend the network
 Ensure secure access
IBM MobileFirst Security
 Safeguard mobile apps
 Preserve user experience without
compromising security
Key offerings:
 IBM Security Access
Manager for Mobile
 IBM Security Appscan
 Trusteer, an IBM
company
19#IBMINTERCONNECT
Mobile security – more than just the device
Manage device
Set appropriate security policies
• Register • Compliance • Wipe
• Lock
Secure Data
Data separation • Leakage •
Encryption
Application Security
Offline authentication •
Application level controls
Secure Access
Properly identify mobile users and
devices • Allow or deny access
• Connectivity
Monitor & Protect
Identify and stop mobile threats •
Log network access, events, and
anomalies
Secure Connectivity
Secure Connectivity from devices
Secure Application
Utilize secure coding practices
• Identify application vulnerabilities
• Update applications
Integrate Securely
Secure connectivity to enterprise
applications and services
Manage Applications
Manage applications and enterprise
app store
At the Device
Over the Network
and Enterprise
For the Mobile App
Enterprise
Intranet
Internet
20#IBMINTERCONNECT
Mobile Network, Data and Access Security:
Achieve visibility and adaptive security policies
Centralized User Management: A singular view of all the mobile users across one or more
mobile apps enables consistency and reduces redundancy and complexity
Segmenting Mobile Users: Segmenting mobile users based on access privileges allows for
better management through tiered access.
Enumerating Context Attributes: Selection of the contextual attributes allows better control
and reduces risk of each user interaction.
Defining Access Policies to Govern Risk: Access policies for applications and content
allows for greater consistency and logic testing.
21#IBMINTERCONNECT
As part of a mobile security strategy, IBM is launching
its NEW appliance-based solution - IBM Security
Access Manager for Mobile
Safeguard mobile, cloud and social interactions across the enterprise with the new
appliance based solution - ISAM for Mobile
 Enable secure access to mobile and web
applications with single sign-on, session
management and context-based access control
 Improve identity assurance with flexible
authentication schemes, such as one-time
passwords and RSA SecurID token support
 Enforce context-aware authorization using
device fingerprinting, geographic location
awareness and IP reputation scores
 Obtain security intelligence and demonstrate
compliance by integrating with IBM® QRadar®
Security Intelligence Platform to get actionable
insights for reducing risks
 Realize a fast time to value and lower total
cost of ownership (TCO) with an easy-to-
deploy-and-manage physical appliance or virtual
appliance
Solution Highlights
Mobile Access Management
Mobile Identity Management
Mobile Security Intelligence & Compliance
Available as either virtual or physical appliance
IBM Security Access Manager
for Mobile
22#IBMINTERCONNECT
Application Security: Instituting a Safe Mobile App
Development Culture
Establish a Security Standard: Development of security quality standard must be pre-
defined and followed.
Segregate Security Logic from Business Logic: Security requirements will have less
variation than business logic and requires different set of skills.
Analyze Security Applications: Mobile apps need to be assessed for their risk exposure –
sensitivity of data and usage scenarios
.
App Management Policies: Active management of applications is required to respond when
mobile apps are compromised.
23#IBMINTERCONNECT
IBM Security
AppScan
IBM Security AppScan
Identify vulnerabilities in web and mobile application source code
 Native Android and iOS application
support
 Better vulnerability detection from:
 Risk assessment of over 40,000 APIs
 Full call and data flow analysis for Java,
JavaScript, Object-C (Mac OS X)
 Provides identification of sensitive data
leak sources
 Helps reduce malware susceptibility of
mobile apps
What’s new in IBM Security AppScan V8.7
 Native support extended for iOS to accelerate enterprise usage
 Enhanced support for JavaScript analysis in hybrid mobile apps
 Out-of-the-box support for IBM Worklight built apps to incorporate context aware risk-
based access
24#IBMINTERCONNECT
Trusteer advances the IBM MobileFirst security
strategy and strengthens IBM’s portfolio of
integrated solutions
IBM Enters Web Fraud Protection
leading web fraud capabilities assists IBM's
financial services and web commerce customers
Strengthens IBM Mobile Security
as part of IBM MobileFirst, Trusteer helps enable
secure transactions from devices to the back office
Extends Advanced Threat Protection
provides a unique endpoint solution to help identify
and prevent Advanced Persistent Threats
Security-as-a-Service
cloud-based deployment enables rapid adoption
and real-time updates
25#IBMINTERCONNECT
1 Learn more about mobile security in our
interactive demo: www.ibm.com/security/tool.html
Learn more: ibm.com/mobilefirst
2
3
Three ways to get started with IBM MobileFirst
Schedule a free Mobile Agenda workshop
Email: ibmmobile@us.ibm.com
26#IBMINTERCONNECT
To schedule a workshop, email: ibmmobile@us.ibm.com
Schedule a Mobile Agenda Workshop
One day interactive workshop with an IBM Mobile expert to help
enterprises plan and develop a customized roadmap for success
• Interactive discussion to
understand client business
drivers, pains and requirements
• Overview of IBM MobileFirst
Strategy, technology and POV’s
• Industry trends and imperatives
• Structured working session to
outline next steps
Client ValueWorkshop Highlights
For Line of business and IT
leaders seeking expertise and
experience in developing,
enhancing, and/or executing
their mobile enterprise
strategy.
• Industry expertise with top
use cases and successes
• Capability assessment
including identification of
opportunities and gaps in
mobile strategy
• A detailed client report and
next steps
#IBMINTERCONNECT
© 2013 IBM Corporation
Thank You

Mais conteúdo relacionado

Mais procurados

Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case studyManageEngine
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 

Mais procurados (20)

Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
ManageEngine Desktop management - Strathallan school case study
ManageEngine Desktop management - Strathallan school   case studyManageEngine Desktop management - Strathallan school   case study
ManageEngine Desktop management - Strathallan school case study
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 

Destaque

Apresentação Inovaserra 2013
Apresentação Inovaserra 2013Apresentação Inovaserra 2013
Apresentação Inovaserra 2013Hugo Cristo
 
GLAM-WIKI - Wikimedia tech infrastructure
GLAM-WIKI - Wikimedia tech infrastructureGLAM-WIKI - Wikimedia tech infrastructure
GLAM-WIKI - Wikimedia tech infrastructureBrianna Laugher
 
Public history in the digital age - Claudine Chionh
Public history in the digital age - Claudine ChionhPublic history in the digital age - Claudine Chionh
Public history in the digital age - Claudine ChionhBrianna Laugher
 
DevOps (Why, What and How) - Arab web summit 2016
DevOps (Why, What and How) - Arab web summit 2016DevOps (Why, What and How) - Arab web summit 2016
DevOps (Why, What and How) - Arab web summit 2016Ahmed Fawzy
 
Gratis & libre - Liam Wyatt
Gratis & libre - Liam WyattGratis & libre - Liam Wyatt
Gratis & libre - Liam WyattBrianna Laugher
 
to-do checklist for Web Developer
to-do checklist for Web Developerto-do checklist for Web Developer
to-do checklist for Web DeveloperRenzil D'cruz
 
Market Research to Understand Behavior of sales wrt Price and flavor
Market Research to Understand Behavior of sales wrt Price and flavorMarket Research to Understand Behavior of sales wrt Price and flavor
Market Research to Understand Behavior of sales wrt Price and flavorRenzil D'cruz
 
Contemporary management : Information Challenges
Contemporary management : Information ChallengesContemporary management : Information Challenges
Contemporary management : Information ChallengesRenzil D'cruz
 
Book Summary: Peter Drucker
Book Summary: Peter DruckerBook Summary: Peter Drucker
Book Summary: Peter DruckerNuri Cankaya
 

Destaque (11)

Apresentação Inovaserra 2013
Apresentação Inovaserra 2013Apresentação Inovaserra 2013
Apresentação Inovaserra 2013
 
GLAM-WIKI - Wikimedia tech infrastructure
GLAM-WIKI - Wikimedia tech infrastructureGLAM-WIKI - Wikimedia tech infrastructure
GLAM-WIKI - Wikimedia tech infrastructure
 
Public history in the digital age - Claudine Chionh
Public history in the digital age - Claudine ChionhPublic history in the digital age - Claudine Chionh
Public history in the digital age - Claudine Chionh
 
DevOps (Why, What and How) - Arab web summit 2016
DevOps (Why, What and How) - Arab web summit 2016DevOps (Why, What and How) - Arab web summit 2016
DevOps (Why, What and How) - Arab web summit 2016
 
Visualising geo-data
Visualising geo-dataVisualising geo-data
Visualising geo-data
 
Health information and youth: challenges in the Internet age
Health information and youth: challenges in the Internet ageHealth information and youth: challenges in the Internet age
Health information and youth: challenges in the Internet age
 
Gratis & libre - Liam Wyatt
Gratis & libre - Liam WyattGratis & libre - Liam Wyatt
Gratis & libre - Liam Wyatt
 
to-do checklist for Web Developer
to-do checklist for Web Developerto-do checklist for Web Developer
to-do checklist for Web Developer
 
Market Research to Understand Behavior of sales wrt Price and flavor
Market Research to Understand Behavior of sales wrt Price and flavorMarket Research to Understand Behavior of sales wrt Price and flavor
Market Research to Understand Behavior of sales wrt Price and flavor
 
Contemporary management : Information Challenges
Contemporary management : Information ChallengesContemporary management : Information Challenges
Contemporary management : Information Challenges
 
Book Summary: Peter Drucker
Book Summary: Peter DruckerBook Summary: Peter Drucker
Book Summary: Peter Drucker
 

Semelhante a IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure

IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochureDan Smith
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionDalia Reda
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Mobile computing ppt for the students ppt
Mobile computing ppt for the students pptMobile computing ppt for the students ppt
Mobile computing ppt for the students pptkhajapasha5978
 
Mobile computing ppt for the students ppt
Mobile computing ppt for the students pptMobile computing ppt for the students ppt
Mobile computing ppt for the students pptkhajapasha5978
 

Semelhante a IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure (20)

IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
SAND SKILLS
SAND SKILLSSAND SKILLS
SAND SKILLS
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
vmw-business-mobility-brochure
vmw-business-mobility-brochurevmw-business-mobility-brochure
vmw-business-mobility-brochure
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Mobile computing ppt for the students ppt
Mobile computing ppt for the students pptMobile computing ppt for the students ppt
Mobile computing ppt for the students ppt
 
Mobile computing ppt for the students ppt
Mobile computing ppt for the students pptMobile computing ppt for the students ppt
Mobile computing ppt for the students ppt
 

Mais de Chris Pepin

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesChris Pepin
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at homeChris Pepin
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Chris Pepin
 

Mais de Chris Pepin (20)

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at home
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure

  • 1. Institute a Mobile First IT Infrastructure Plan, integrate, optimize and manage IT and communications infrastructures to securely deploy mobile Vijay Dheap, Global Solutions Manager - Big Data Security Intelligence & Mobile Security Chris Pepin, Global Services Executive, IBM MobileFirst © 2013 IBM Corporation @chrispepin
  • 2. 2#IBMINTERCONNECT Current trends in the mobile marketplace 1 http://techcrunch.com/2012/02/14/the-number-of-mobile-devices-will-exceed-worlds-population-by-2012-other-shocking-figures 3 http://newsroom.fb.com/content/default.aspx?NewsAreaId=22 Number of mobile- connected devices to surpass human population by 2016 1 Device Explosion Corporate IT embracing the need to implement a strong Mobile security policy Compliance 1B+ monthly Facebook users 3 680M monthly FB mobile users 3 Social Evolving workplace Work any place/ any time Mobile device proliferation – form factor, platform, services BYOD Device consistency Greater adoption of User/device authentication and single sign-on Data Separation Increasing need for Application Vulnerability testing and certification. Encryption of data within an application Applications
  • 3. 3#IBMINTERCONNECT • Infrastructure complexity from multiple device platforms • Unique mobile requirements for employees/workers • Extending data, voice and video applications to mobile devices • Integrating across wireline/wireless LAN platforms • “Consumerization of IT” forcing CIOs to have BYOD policy and plan; provide employee device choice • Anytime, anywhere, any device access now standard • Social business interactions are increasingly important These trends bring business and IT challenges •Business and IT change •Security and management • Protection of privacy and confidential information • Policies for client-owned smartphones and tablets • Visibility, security and management of mobile platform requirements •Complexity and integration Business and IT Change Security and Management Complexity and Integration
  • 4. 4#IBMINTERCONNECT Create new value at the moment of awareness Develop and run applications Connect with customers in context Integrate mobile into the fabric of the organization Mobile enterprises are taking an integrated approach to putting their business in motion
  • 5. 5#IBMINTERCONNECT The Mobile First enterprise integrates mobile capabilities into the fabric of the organization They are enabling BYOD Findings from the Institute for Business Value & Oxford Economics offer insight into the practices of mobile leaders They are detecting threats from mobile before they impact the enterprise They are prioritizing data & analytics 82% of mobile strategy leaders said that they were successful with mobile threat detection vs 50% of other respondents 70% of leaders placed investments in data storage, data management and analytics as a high priority, versus <45% of other respondents 79% of mobile strategy leaders have a well documented policy in place for BYOD vs 48% of other respondents They are expanding their network infrastructures 80% of leaders say their current wireless network performance meets the organization's needs vs. 48% of other respondents
  • 6. 6#IBMINTERCONNECT The way forward to optimize your infrastructure Plan, integrate, optimize & manage IT and communication infrastructures to securely deploy mobile to enable growth and further competitive differentiation View mobility as a critical business enabler for future growth and competitive differentiation 3 1 2 Prioritize infrastructure to support mobile and address it strategically as part of their enterprise
  • 7. 7#IBMINTERCONNECT For clients who need to:  Develop new mobile applications  Integrate mobile applications with enterprise IT systems  Manage and secure mobile environments  Maintain visibility, control and automation of mobile devices IBM MobileFirst Development & Integration Services Key offerings:  IBM Mobile Application Platform Management Services  IBM Mobility & Wireless Services IBM MobileFirst Development & Integration Services offer:  Fast cycle development of mobile applications across platforms  Mobile app integration for seamless connectivity and data management  Secure and seamless wired, wireless, cellular and WiFi network access including increased network bandwidth required for voice, data and video  Secure mobile device and application management
  • 8. 8#IBMINTERCONNECT  Support for both enterprise and consumer mobile applications across multiple device types  Mobile application integration for seamless connectivity and data management  Faster development and better lifecycle management of mobile applications across platforms  A fully managed service which enables the rapid deployment and configuration of a single mobile application platform without requiring an investment on in-house skills  Management and control over the deployment of mobile applications and data IBM Mobile Application Platform Management Extend existing applications to mobile devices while limiting IT investment and expenses Mobile Application Platform
  • 9. 9#IBMINTERCONNECT  Security-rich access to support mobile collaboration and BYOD policies  Robust infrastructures and mobile connectivity as a foundation to help support mobile and remote workers  Identification of security threats and application of best-practice design and tools to automatically contain those threats  Consolidated infrastructure to help support network application services: voice, video and data communications IBM Mobility and Wireless Services Integrated IT network access, management and security to support mobile environments Voice Mobile collaboration Location awareness Intelligent messaging Video Data and web access Enterprise mobility
  • 10. 10#IBMINTERCONNECT Westfalen Weser Energie simplifies device maintenance and error diagnostics with remote management Challenges Combat unauthorized access and damage at the utility’s relay stations, resolve disruptions on the ground more quickly, and provide better support for mobile service technicians. Solution As part of a joint project involving Cisco, IBM, and Intel, Westfalen utilizes special Cisco IP cameras, a back-end server platform based on Intel® Xeon® processors, and Intelligent Video Analytics software from IBM to assess recordings made in the field. IBM also configured outdoor WLAN access points at the technology centers and relay stations to ensure mobile employees are readily contactable. Benefits • Better protection of relay stations against theft and unauthorized access. • Simplified visual inspections of equipment and faster response in the event of a fault. • Mobile video conferencing connects specialist experts from the control room with service technicians on the ground. “A major consideration was the need to improve communication between the service technicians on the ground and executives in the control centers.” Reimar Süß, Project Manager, Westfalen Weser Energie
  • 11. 11#IBMINTERCONNECT Devices Network, Data, and Access Applications Manage & Secure Corporate Devices, BYOD Achieve Visibility and Adaptive Policy Management Securely & Efficiently Develop, Test, Deploy, and Manage IBM MobileFirst’s approach to mobile management and security Security Intelligence Service Desk & Self Service
  • 12. 12#IBMINTERCONNECT IBM MobileFirst Management offers:  Unified management across devices  Selective wipe of corporate data  Configuration & enforcement of password policies, encryption, VPN access & camera use  Streamlined workflow between development & operations with an integrated Enterprise App Store  Optimize telecom expenses with detailed usage analyses  End-user portal for management of mobile equipment, carrier plans, and usage tracking  On-premises or managed service delivery For clients who need to:  Implement BYOD with confidence  Manage secure sensitive data, regardless of the device  Manage, track and optimize mobile expenses  Handle multi-platform complexities with ease IBM MobileFirst Management Key offerings:  IBM Endpoint Manager for mobile devices  IBM Mobile Enterprise Services for managed mobility
  • 13. 13#IBMINTERCONNECT IBM Endpoint Manager for mobile devices Single console management and security of ALL employee devices What’s new in IBM Endpoint Manager for Mobile Devices V2.2  Deployment, configuration, and management of multiple 3rd party container technologies  Increased security at both the network access and app layers through integration with Cisco ISE and IBM Worklight  Unified device management bringing together mobile devices, desktops, and servers  Integrated management of containerization technologies to support BYOD  Deployment and management of apps, including integrated transfers from Worklight  Single-device views and near-real time data integrated with Service Desk and CMDB  Self-service portal for locating and securing lost devices
  • 14. 14#IBMINTERCONNECT St. Vincents Health Australia unifies management of mobile devices, desktops, and servers Challenges With a diverse set of around 6,500 academic, medical practitioner and administrative users, the IT team must provide access to the latest technologies while protecting patient privacy across servers, desktops, and mobile devices. Solution Using IBM Endpoint Manager, built on BigFix technology, Sydney based hospitals with the St Vincents Health Australia group, has a single solution for patch management, configuration compliance, power management, lifecycle management, remote desktop, software usage reporting, and mobile device management. Benefits • Visibility and control over 100 percent of endpoints • Significantly mitigated data privacy risk exposure • Freed up IT staff to execute additional strategic projects • Realized cost savings through PC power management and the elimination of software licenses • Simplify email, application, inventory, and configuration management on mobile devices “We now have a rich systems remediation platform from which to deploy endpoint security. Once we discovered the power management and application deployment capabilities, we knew we had found the complete solution we were looking for.” ~Peter Param, IT Security Manager, St Vincents Health Australia
  • 15. 15#IBMINTERCONNECT  Comprehensive management of mobile environments including set up, transition, ongoing operations and management  Apple iOS, Google Android, BlackBerry®, Microsoft Windows Mobile smartphones, tablets and rugged devices acquired, distributed and managed for you with subscription-based pricing  Deployment of mobile applications across the organization to boost productivity  Secure corporate data and enhance compliance and consistency with centralized management, self service portal and service desk  Leverage mobile email as critical enterprise tool Mobile Enterprise Services for managed mobility Tackle complexity, risk and costs in highly dynamic mobile IT infrastructures
  • 16. 16#IBMINTERCONNECT Kochi Medical School Hospital improves care quality while cutting costs using Mobile Enterprise Services Challenges The hospital wanted to update its mobile environment to improve care quality, medical staff productivity and operating cost reduction. Solution IBM helped the hospital to restructure its architecture to take advantage of Apple iPod Touch devices, offering a more intuitive user interface, lower maintenance costs and a broader range of applications. IBM also migrated the school’s existing medical applications and patient record systems to the IBM SmarterCloud Desktop platform. Benefits  Lower per-device expense helps reduce maintenance costs and equip a larger pool of employees  Improved patient care coordination and increased efficiency by extending access to critical medical systems  Cloud based architecture maintains a security- rich environment for medical information which extends to, but is not stored on, mobile devices “We wanted to improve the productivity for our medical staff to access the patient records at any time, at any place in our hospital securely by mobile devices. IBM knew how to make that happen cost- effectively and without compromising the security of patient records.” Mr. Yoshiyasu Okuhara, Professor and Director, Center of Medical Information Science, Kochi Medical School Hospital
  • 17. 17#IBMINTERCONNECT Why take an integrated approach to mobile security? Speed time to deployment of enterprise mobile apps and updates, while improving quality Improve WiFi network management for greater reliability, employee productivity, and minimize business interruptions Enhance end-to-end security to help prevent loss of intellectual property and regulated data Less total infrastructure for lower hardware, admin costs Reduce help desk calls, device and service lifecycle costs
  • 18. 18#IBMINTERCONNECT IBM MobileFirst Security offers:  Context aware risk – based access control  Mobile threat protection  Strong session management & Single Sign–on  Vulnerability analysis for mobile apps  Visibility and analysis of security events from the device, network, user end app behavior For clients who need to:  Protect devices and data  Defend the network  Ensure secure access IBM MobileFirst Security  Safeguard mobile apps  Preserve user experience without compromising security Key offerings:  IBM Security Access Manager for Mobile  IBM Security Appscan  Trusteer, an IBM company
  • 19. 19#IBMINTERCONNECT Mobile security – more than just the device Manage device Set appropriate security policies • Register • Compliance • Wipe • Lock Secure Data Data separation • Leakage • Encryption Application Security Offline authentication • Application level controls Secure Access Properly identify mobile users and devices • Allow or deny access • Connectivity Monitor & Protect Identify and stop mobile threats • Log network access, events, and anomalies Secure Connectivity Secure Connectivity from devices Secure Application Utilize secure coding practices • Identify application vulnerabilities • Update applications Integrate Securely Secure connectivity to enterprise applications and services Manage Applications Manage applications and enterprise app store At the Device Over the Network and Enterprise For the Mobile App Enterprise Intranet Internet
  • 20. 20#IBMINTERCONNECT Mobile Network, Data and Access Security: Achieve visibility and adaptive security policies Centralized User Management: A singular view of all the mobile users across one or more mobile apps enables consistency and reduces redundancy and complexity Segmenting Mobile Users: Segmenting mobile users based on access privileges allows for better management through tiered access. Enumerating Context Attributes: Selection of the contextual attributes allows better control and reduces risk of each user interaction. Defining Access Policies to Govern Risk: Access policies for applications and content allows for greater consistency and logic testing.
  • 21. 21#IBMINTERCONNECT As part of a mobile security strategy, IBM is launching its NEW appliance-based solution - IBM Security Access Manager for Mobile Safeguard mobile, cloud and social interactions across the enterprise with the new appliance based solution - ISAM for Mobile  Enable secure access to mobile and web applications with single sign-on, session management and context-based access control  Improve identity assurance with flexible authentication schemes, such as one-time passwords and RSA SecurID token support  Enforce context-aware authorization using device fingerprinting, geographic location awareness and IP reputation scores  Obtain security intelligence and demonstrate compliance by integrating with IBM® QRadar® Security Intelligence Platform to get actionable insights for reducing risks  Realize a fast time to value and lower total cost of ownership (TCO) with an easy-to- deploy-and-manage physical appliance or virtual appliance Solution Highlights Mobile Access Management Mobile Identity Management Mobile Security Intelligence & Compliance Available as either virtual or physical appliance IBM Security Access Manager for Mobile
  • 22. 22#IBMINTERCONNECT Application Security: Instituting a Safe Mobile App Development Culture Establish a Security Standard: Development of security quality standard must be pre- defined and followed. Segregate Security Logic from Business Logic: Security requirements will have less variation than business logic and requires different set of skills. Analyze Security Applications: Mobile apps need to be assessed for their risk exposure – sensitivity of data and usage scenarios . App Management Policies: Active management of applications is required to respond when mobile apps are compromised.
  • 23. 23#IBMINTERCONNECT IBM Security AppScan IBM Security AppScan Identify vulnerabilities in web and mobile application source code  Native Android and iOS application support  Better vulnerability detection from:  Risk assessment of over 40,000 APIs  Full call and data flow analysis for Java, JavaScript, Object-C (Mac OS X)  Provides identification of sensitive data leak sources  Helps reduce malware susceptibility of mobile apps What’s new in IBM Security AppScan V8.7  Native support extended for iOS to accelerate enterprise usage  Enhanced support for JavaScript analysis in hybrid mobile apps  Out-of-the-box support for IBM Worklight built apps to incorporate context aware risk- based access
  • 24. 24#IBMINTERCONNECT Trusteer advances the IBM MobileFirst security strategy and strengthens IBM’s portfolio of integrated solutions IBM Enters Web Fraud Protection leading web fraud capabilities assists IBM's financial services and web commerce customers Strengthens IBM Mobile Security as part of IBM MobileFirst, Trusteer helps enable secure transactions from devices to the back office Extends Advanced Threat Protection provides a unique endpoint solution to help identify and prevent Advanced Persistent Threats Security-as-a-Service cloud-based deployment enables rapid adoption and real-time updates
  • 25. 25#IBMINTERCONNECT 1 Learn more about mobile security in our interactive demo: www.ibm.com/security/tool.html Learn more: ibm.com/mobilefirst 2 3 Three ways to get started with IBM MobileFirst Schedule a free Mobile Agenda workshop Email: ibmmobile@us.ibm.com
  • 26. 26#IBMINTERCONNECT To schedule a workshop, email: ibmmobile@us.ibm.com Schedule a Mobile Agenda Workshop One day interactive workshop with an IBM Mobile expert to help enterprises plan and develop a customized roadmap for success • Interactive discussion to understand client business drivers, pains and requirements • Overview of IBM MobileFirst Strategy, technology and POV’s • Industry trends and imperatives • Structured working session to outline next steps Client ValueWorkshop Highlights For Line of business and IT leaders seeking expertise and experience in developing, enhancing, and/or executing their mobile enterprise strategy. • Industry expertise with top use cases and successes • Capability assessment including identification of opportunities and gaps in mobile strategy • A detailed client report and next steps
  • 27. #IBMINTERCONNECT © 2013 IBM Corporation Thank You