SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
3642 IBM MobileFirst Services:
Explore Mobile Consulting,
Implementation and Managed Services
Chris Pepin
Mobile Enterprise Executive
IBM Global Technology Services
@chrispepin
cpepin@us.ibm.com
• IBM’s statements regarding its plans, directions, and intent are subject to
change or withdrawal without notice at IBM’s sole discretion.
• Information regarding potential future products is intended to outline our
general product direction and it should not be relied on in making a purchasing
decision.
• The information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be
incorporated into any contract. The development, release, and timing of any
future features or functionality described for our products remains at our sole
discretion.
• Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user's job
stream, the I/O configuration, the storage configuration, and the workload
processed. Therefore, no assurance can be given that an individual user will
achieve results similar to those stated here.
2© 2013 IBM Corporation
Agenda
• The mobile revolution and challenges
• An introduction to IBM MobileFirst
• Becoming a Mobile Enterprise
• MobileFirst services
© 2013 IBM Corporation 3
Mobile is everywhere
Mobile is about transacting
1
96% year to year increase in mobile cyber Monday sales between 2012 and 2011
Mobile enables the Internet of Things
91% of mobile users keep their device within arm’s reach 100% of the time
2
4
3
Mobile is primary
5
90% of users use multiple screens as channels come together to create integrated experiences
Mobile must create a continuous brand experience
Global Machine-to-machine connections will increase from 2 billion in 2011 to 18 billion at the
end of 2022
Insights from mobile data provide new opportunities
75% of mobile shoppers take action after receiving a location based messages2
Mobile challenges
Integrating mobile into business processes
1
Increasing productivity, increasing profits, differentiating the customer experience
Skills and infrastructure readiness
Devices, data and mobile applications
2
4
3
Security
5
Develop deploy and manage mobile applications across multiple platforms
Mobile applications
9 out of 10 enterprises don’t have the mobile, cloud and analytics skills they need
Bring Your Own Device (BYOD)
Employees bringing personally owned devices to work2
Video: IBM MobileFirst
http://www.youtube.com/watch?v=sHQe4FsJ0X4
IBM’s expanding mobile portfolio
125+ patents for wireless inventions in 2012, bringing the total to 270
1H
Emptoris Rivermine Telecom
Expense Management
2012
IBM announced:
IBM Mobile Foundation
IBM Endpoint Manager
Named leader in
interactive design
IBM acquired:
Tealeaf CX Mobile
2H
IBM announced:
Managed Mobility
and MAPM Services
and
IBM Security Access Manager
for Cloud and Mobile
IBM announced:
IBM Mobile
Development
Lifecycle Solution
IBM announced:
IBM Connections Mobile
IBM acquired:
IBM Cast Iron
2013
1H
IBM announced:
IBM acquired:
Urban Code DevOps
Platform
Steps to becoming a mobile enterprise
© 2013 IBM Corporation 9
A mobile enterprise starts with a strategy
• Defining the business problem and success criteria
• Personas and use cases
• Mobile infrastructure readiness
• Processes and governance model
Strategy
Enterprises need at least two strategies: B2E and B2C
Written mobile policy is essential
• Terms and conditions for devices,
security and applications
• Corporate owned devices as well
as BYOD; data privacy
• Input from human resources, legal,
procurement and reimbursement
© 2013 IBM Corporation 12
Comprehensive policy for PCs, smartphones and tablets
Policy
Mobile security risks are significant…
Frequency
Never Rare Often Frequently
LimitedMassive
Loss/Theft/
Seizure
Based on Gartner, Mobile Security Risks, interviews with members of ISS
xForce, and Corporate Executive Board
Blue Tooth
Slurping
Man in the
Middle
Attack
Impact
III
IIIIV
Roving
Bug/Illegal
Malware/
Spyware/
Grayware
Location
Logging &
Tracking
…and involve more than just the device
Manage device
Set appropriate security
policies • Register •
Compliance • Wipe • Lock
Secure Data
Data separation • Leakage •
Encryption
Application Security
Offline authentication •
Application level controls
Secure Access
Properly identify mobile users
and devices • Allow or deny
access • Connectivity
Monitor & Protect
Identify and stop mobile
threats •
Log network access, events,
and anomalies
Secure Connectivity
Secure Connectivity from
devices
Secure Application
Utilize secure coding practices
• Identify application
vulnerabilities • Update
applications
Integrate Securely
Secure connectivity to
enterprise applications and
services
Manage Applications
Manage applications and
enterprise app store
Device Network Applications
“Mobile computing devices should be more
secure than traditional user computing devices
by 2014”
Education is key to reducing security risk
• Identifying cybersecurity threats
• Protecting corporate and client data
• Safeguarding devices
• Data and security incident reporting
• Build a “culture of security”
© 2013 IBM Corporation 16
Published guidelines, online education and social interaction
Education
Technology maps to business requirements
• Mobile Device Management (MDM)
• Containerization, virtualization, encryption
• Anti-malware
• Network access control
• Mobile Application Platform
© 2013 IBM Corporation 17
One size doesn’t fit all
Technology
Enterprise Needs:
 Protect corporate applications and data, not just the device
 Prevent data leakage from enterprise apps to personal apps and
public cloud-based services
 Enforce advanced security features such as file-level encryption
 Centrally administer and enforce permissions and policies
 Ability to remotely wipe all work-related applications and data
Personal Needs:
 Maintain full control over personal apps and data
 Enterprise policies do not apply when the device is not connected
to the enterprise network and corporate applications are not in use
 Selective wipe ensures that personal data remains untouched
 Simple to switch between personal and work functions
Separating personal and work data
Virtualized Devices &
Virtual Desktop Infrastructure (VDI)
Mobile Device Management Secure Container
MDM
Enterprise
Container
Management
Server
Enterprise
Device
Personal
Device
 Manage device security
policies (password,
encryption, etc.)
 MDM controls enterprise
access (WIFI / VPN / email)
 Wipe and “selective wipe”
enterprise data and apps
 Create a “secure container”
 Replace the default mail /
calendar / contacts
 Allow organizations to write
apps that run in the
container; encryption
 Virtualize the device OS
 Create a virtualized
“enterprise device” and
“personal device”
 Virtual Enterprise Desktop
 Virtual Applications
Enterprise
Desktop
Approaches to data separation
Mobile Enterprise Management solutions
• Moving beyond Mobile Device Management (MDM)
• Microsoft Exchange ActiveSync is NOT the answer
• Connected cloud and on-premise solutions
• What devices do I need to manage?
• What features do I need?
© 2013 IBM Corporation 20
Mobile application development
• Native, web, HTML5, hybrid, virtual
• Developing solutions for multiple platforms
• Deployment: public and private app stores
• Security
© 2013 IBM Corporation 21
IBM is a mobile enterprise
• 435,000 employees worldwide; 50%
mobile
• BYOD isn’t new at IBM and includes
smartphone, tablets as well as laptops
• 120,000 employees leveraging
smartphones and tablets; 80,000 BYOD
• 600,000 managed laptops/desktops;
30,000 BYOD
• IBM embraces social computing
IBM's BYOD program
"really is about supporting
employees in the way they
want to work. They will
find the most appropriate
tool to get their job done. I
want to make sure I can
enable them to do that, but
in a way that safeguards
the integrity of our
business.“
- IBM CIO Jeanette Horan
Video: IBM Mobile Technology – A Personal
Journey
http://www.youtube.com/watch?v=0sEaLyLjFag
Mobile @ IBM
• Legal
Personally owned device terms
and conditions
• Policy
Same overriding security policy for
all endpoints (laptop, mobile, other)
• Technical controls
Detailed security settings per
platform (“techspecs”)
 Formal
Mandatory Digital IBMer Security
Training
 Casual
IBM Secure Computing Guidelines
Targeted w3 articles
 Social
Secure Computing Forum
Secure Computing Blog Posts
 Developer
Secure Engineering guidelines
Mobile app security guidelines
 Endpoint Management
(overall control)
 Anti-malware
(malicious app protection)
 Network access control
& Application level security
(data protection)
 Containerization / Virtualization
(data protection, data privacy, end user acceptance)
 Mobile as primary
 Personas
(13 inside IBM)
 BYOD policy
(Windows, Linux, Mac, smartphones, tablets)
Industry Solutions
IBM & Partner Applications
Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive
Application & Data Platform
Strategy&DesignServices
Cloud & Managed Services
Devices Network Servers
Development&IntegrationServices
Management AnalyticsSecurity
IBM MobileFirst Offering Portfolio
Industry Solutions
IBM & Partner Applications
Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive
Application & Data Platform
Cloud & Managed Services
Devices Network Servers
Development&IntegrationServices
Management AnalyticsSecurity
Strategy&DesignServices
IBM MobileFirst Offering Portfolio
To schedule a workshop, email: ibmmobile@us.ibm.com
• Interactive discussion to
understand client business
drivers, pains and requirements
• Overview of IBM MobileFirst
Strategy, technology and POV’s
• Industry trends and imperatives
• Structured working session to
outline next steps
Client ValueWorkshop Highlights
For Line of business and IT
leaders seeking expertise and
experience in developing,
enhancing, and/or executing
their mobile enterprise
strategy.
• Industry expertise with top
use cases and successes
• Capability assessment
including identification of
opportunities and gaps in
mobile strategy
• A detailed client report and
next steps
One day interactive workshop with an IBM mobile expert to help
enterprises plan and develop a customized roadmap for success
IBM MobileFirst Journey Workshop
IBM MobileFirst Strategy & Design Services offer:
 Customer journey mapping for mobile engagement
 Accelerated mobile strategy and business case
creation
 Vision and delivery of compelling mobile web
experience
 Detailed strategies for infrastructure for mobile
enterprise IT and communication initiatives
For clients who need to:
 Ensure mobile projects yield measurable business value
 Link mobile investments to ROI and IT strategy
 Establish plans for growth and maturity of mobile initiatives
IBM MobileFirst Strategy & Design Services
Key offerings:
 IBM Interactive
 IBM Mobile Infrastructure
Strategy and Planning
Services
 Mobile Strategy
Accelerator
5/22/2013 29
Interactive agency with a unique ability to imagine, discover and deliver
compelling user experiences
IBM Interactive
Industry Solutions
IBM & Partner Applications
Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive
Application & Data Platform
Strategy&DesignServices
Cloud & Managed Services
Devices Network Servers
Management AnalyticsSecurity
Development&IntegrationServices
IBM MobileFirst Offering Portfolio
For clients who need to:
 Develop new mobile applications
 Integrate mobile applications with enterprise IT systems
 Manage and secure mobile environments
 Maintain visibility, control and automation of mobile devices
IBM MobileFirst development services
Key offerings:
 IBM Mobile Application
Development from the
Cloud
 IBM Mobility and Wireless
Services
IBM MobileFirst Development & Integration Services
offer:
 Fast cycle development of mobile applications across
platforms
 Mobile application integration for seamless connectivity
and data management
 Secure and seamless wired, wireless, cellular and WiFi
network access including increased network bandwidth
required for voice, data and video
IBM On Demand Consulting for Mobile
 For clients with development teams and some experience with Mobile projects
 Fast path to expert help on Mobile development projects
 Offerings customized to client skill level and requirements
 Defined access to architects and technical experts for the IBM Mobile
Enterprise Development Lifecycle
 Sharing of Best Practices and Experiences to continually help improve client
experience with Mobile development and implementation
 Quarterly or yearly subscription
Provides clients access to IBM’s technical experts for mobile
Industry Solutions
IBM & Partner Applications
Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive
Application & Data Platform
Strategy&DesignServices
Devices Network Servers
Management AnalyticsSecurity
Development&IntegrationServices
Cloud & Managed Services
IBM MobileFirst Offering Portfolio
For clients who need to:
 Manage complex IT infrastructures and/or multi-vendor mobile
environments
 Optimize IT resources across the extended enterprise
 Address shortages or gaps in mobile IT skills
IBM MobileFirst cloud and managed services
Key offerings:
 IBM Mobile Enterprise
Services for managed
mobility
 IBM Mobile Enterprise
Services – Mobile
Application Platform
Management
IBM Cloud and Managed Services offer:
 Flexible and scalable compute power with access to
greater network bandwidth
 Predictable allocation of, and investment in, current
skills and IT resources that support mobile initiatives
 Multi-vendor integration and device support
 Highly efficient coordination of global mobile projects
 Deploy and manage a security-rich enterprise mobility strategy for both
BYOD and corporate issued devices
 Comprehensive approach to managing devices via mobile device
management platform, tools and services
 Secure corporate data and enhance compliance and consistency
 Includes mobile messaging software to perform two-way synchronization of
email, contact and calendar
IBM MobileFirst managed mobility services
Smartphones, tablets and rugged devices acquired, distributed and
managed for you with subscription-based pricing
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research,
Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with
exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave.
Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
Breadth and Depth are Today’s
Differentiators in Enterprise Mobility Services
“Today’s enterprise mobility market comprises
many different providers, ranging from the
agencies that specialize in user interface (UI)/
design work to development boutiques to large
multinationals. However, few truly have the scale
across the life cycle of services, from user
interface and design skills to business acumen
to mobile technology expertise.”
Source: Forrester Research Inc. “Forrester WaveTM”: Enterprise
Mobility Services, Q1 2013”
Full report can be accessed at http://www.ibm.com
Forrester WaveTM Enterprise Mobility
Services names IBM a leader for 1Q2013
IBM services map to business needs
© 2013 IBM Corporation 38
IBM mobile partnerships and alliances
Connect to backend systems
in support of mobile
Manage mobile devices
and applications
Transform the
business by creating
new opportunities
Extend existing business
capabilities to mobile devices
Build mobile
applications
Secure your
mobile business
Assess and Plan
enterprise mobile
strategy
Start with a
consulting
assessment
IBM Global Technology Services offers
solutions to address the complete mobile
lifecycle
Questions?
Chris Pepin
Mobile Enterprise Executive
IBM Global Technology Services
cpepin@us.ibm.com
@chrispepin
© IBM Corporation 2012. All Rights Reserved.
IBM, the IBM logo, ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions
worldwide. Other product and service names might be trademarks of IBM or
other companies. A current list of IBM trademarks is available on the Web at
“Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
Copyright and Trademarks
42© 2013 IBM Corporation
• Go to summitsmartsite.com from your mobile device or
log on to SmartSite at any Kiosk at the event:
• Select the Survey icon
• Complete the surveys for the sessions you attended
• Submit your feedback
© 2013 IBM Corporation
We appreciate your feedback. Please don’t
forget to fill out your evaluation
Thank you for joining us!
43
 Visit the Smarter Commerce demos in
the Solutions Center
 Schedule an Executive One-on-One
 Spend time with a subject matter expert at Meet
the Experts
 Set up your Twitter account at the Social Media
Command Center
 Sign up to be a reference at our Client Reference Lounge
 Participate in our Hands-on Labs and Certification Testing
Find out more…
Check SmartSite from your phone, computer,
or on-site kiosks for details on these
programs and more.

Mais conteúdo relacionado

Mais procurados

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Summit 7 Systems
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureArrow ECS UK
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationLarry Covert
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 

Mais procurados (20)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Enterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD BrochureEnterasys Mobile IAM BYOD Brochure
Enterasys Mobile IAM BYOD Brochure
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 

Semelhante a IBM MobileFirst Services: Explore Mobile Consulting, Implementation and Managed Services

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 

Semelhante a IBM MobileFirst Services: Explore Mobile Consulting, Implementation and Managed Services (20)

Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Laptop management
Laptop managementLaptop management
Laptop management
 

Mais de Chris Pepin

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesChris Pepin
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at homeChris Pepin
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerChris Pepin
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy Chris Pepin
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityChris Pepin
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutionsChris Pepin
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeChris Pepin
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter WorkplaceChris Pepin
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMChris Pepin
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparisonChris Pepin
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Chris Pepin
 

Mais de Chris Pepin (20)

How IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile TechnologiesHow IBM Enabled its Worldwide Sales Force with Mobile Technologies
How IBM Enabled its Worldwide Sales Force with Mobile Technologies
 
Measuring the weather at home
Measuring the weather at homeMeasuring the weather at home
Measuring the weather at home
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy 6 key things to fast track your mobility strategy
6 key things to fast track your mobility strategy
 
The New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise MobilityThe New Workplace: Unleashing The Power Of Enterprise Mobility
The New Workplace: Unleashing The Power Of Enterprise Mobility
 
Microsoft mobile solutions
Microsoft mobile solutionsMicrosoft mobile solutions
Microsoft mobile solutions
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Enpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytimeEnpowering your workforce to work anywhere anytime
Enpowering your workforce to work anywhere anytime
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
Lotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBMLotusphere 2011: ID702 Smartphones at IBM
Lotusphere 2011: ID702 Smartphones at IBM
 
Smartphone comparison
Smartphone comparisonSmartphone comparison
Smartphone comparison
 
Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26Lotusphere 2009 Review 2009 01 26
Lotusphere 2009 Review 2009 01 26
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

IBM MobileFirst Services: Explore Mobile Consulting, Implementation and Managed Services

  • 1. 3642 IBM MobileFirst Services: Explore Mobile Consulting, Implementation and Managed Services Chris Pepin Mobile Enterprise Executive IBM Global Technology Services @chrispepin cpepin@us.ibm.com
  • 2. • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2© 2013 IBM Corporation
  • 3. Agenda • The mobile revolution and challenges • An introduction to IBM MobileFirst • Becoming a Mobile Enterprise • MobileFirst services © 2013 IBM Corporation 3
  • 4. Mobile is everywhere Mobile is about transacting 1 96% year to year increase in mobile cyber Monday sales between 2012 and 2011 Mobile enables the Internet of Things 91% of mobile users keep their device within arm’s reach 100% of the time 2 4 3 Mobile is primary 5 90% of users use multiple screens as channels come together to create integrated experiences Mobile must create a continuous brand experience Global Machine-to-machine connections will increase from 2 billion in 2011 to 18 billion at the end of 2022 Insights from mobile data provide new opportunities 75% of mobile shoppers take action after receiving a location based messages2
  • 5. Mobile challenges Integrating mobile into business processes 1 Increasing productivity, increasing profits, differentiating the customer experience Skills and infrastructure readiness Devices, data and mobile applications 2 4 3 Security 5 Develop deploy and manage mobile applications across multiple platforms Mobile applications 9 out of 10 enterprises don’t have the mobile, cloud and analytics skills they need Bring Your Own Device (BYOD) Employees bringing personally owned devices to work2
  • 6.
  • 8. IBM’s expanding mobile portfolio 125+ patents for wireless inventions in 2012, bringing the total to 270 1H Emptoris Rivermine Telecom Expense Management 2012 IBM announced: IBM Mobile Foundation IBM Endpoint Manager Named leader in interactive design IBM acquired: Tealeaf CX Mobile 2H IBM announced: Managed Mobility and MAPM Services and IBM Security Access Manager for Cloud and Mobile IBM announced: IBM Mobile Development Lifecycle Solution IBM announced: IBM Connections Mobile IBM acquired: IBM Cast Iron 2013 1H IBM announced: IBM acquired: Urban Code DevOps Platform
  • 9. Steps to becoming a mobile enterprise © 2013 IBM Corporation 9
  • 10. A mobile enterprise starts with a strategy • Defining the business problem and success criteria • Personas and use cases • Mobile infrastructure readiness • Processes and governance model Strategy Enterprises need at least two strategies: B2E and B2C
  • 11.
  • 12. Written mobile policy is essential • Terms and conditions for devices, security and applications • Corporate owned devices as well as BYOD; data privacy • Input from human resources, legal, procurement and reimbursement © 2013 IBM Corporation 12 Comprehensive policy for PCs, smartphones and tablets Policy
  • 13. Mobile security risks are significant… Frequency Never Rare Often Frequently LimitedMassive Loss/Theft/ Seizure Based on Gartner, Mobile Security Risks, interviews with members of ISS xForce, and Corporate Executive Board Blue Tooth Slurping Man in the Middle Attack Impact III IIIIV Roving Bug/Illegal Malware/ Spyware/ Grayware Location Logging & Tracking
  • 14. …and involve more than just the device Manage device Set appropriate security policies • Register • Compliance • Wipe • Lock Secure Data Data separation • Leakage • Encryption Application Security Offline authentication • Application level controls Secure Access Properly identify mobile users and devices • Allow or deny access • Connectivity Monitor & Protect Identify and stop mobile threats • Log network access, events, and anomalies Secure Connectivity Secure Connectivity from devices Secure Application Utilize secure coding practices • Identify application vulnerabilities • Update applications Integrate Securely Secure connectivity to enterprise applications and services Manage Applications Manage applications and enterprise app store Device Network Applications
  • 15. “Mobile computing devices should be more secure than traditional user computing devices by 2014”
  • 16. Education is key to reducing security risk • Identifying cybersecurity threats • Protecting corporate and client data • Safeguarding devices • Data and security incident reporting • Build a “culture of security” © 2013 IBM Corporation 16 Published guidelines, online education and social interaction Education
  • 17. Technology maps to business requirements • Mobile Device Management (MDM) • Containerization, virtualization, encryption • Anti-malware • Network access control • Mobile Application Platform © 2013 IBM Corporation 17 One size doesn’t fit all Technology
  • 18. Enterprise Needs:  Protect corporate applications and data, not just the device  Prevent data leakage from enterprise apps to personal apps and public cloud-based services  Enforce advanced security features such as file-level encryption  Centrally administer and enforce permissions and policies  Ability to remotely wipe all work-related applications and data Personal Needs:  Maintain full control over personal apps and data  Enterprise policies do not apply when the device is not connected to the enterprise network and corporate applications are not in use  Selective wipe ensures that personal data remains untouched  Simple to switch between personal and work functions Separating personal and work data
  • 19. Virtualized Devices & Virtual Desktop Infrastructure (VDI) Mobile Device Management Secure Container MDM Enterprise Container Management Server Enterprise Device Personal Device  Manage device security policies (password, encryption, etc.)  MDM controls enterprise access (WIFI / VPN / email)  Wipe and “selective wipe” enterprise data and apps  Create a “secure container”  Replace the default mail / calendar / contacts  Allow organizations to write apps that run in the container; encryption  Virtualize the device OS  Create a virtualized “enterprise device” and “personal device”  Virtual Enterprise Desktop  Virtual Applications Enterprise Desktop Approaches to data separation
  • 20. Mobile Enterprise Management solutions • Moving beyond Mobile Device Management (MDM) • Microsoft Exchange ActiveSync is NOT the answer • Connected cloud and on-premise solutions • What devices do I need to manage? • What features do I need? © 2013 IBM Corporation 20
  • 21. Mobile application development • Native, web, HTML5, hybrid, virtual • Developing solutions for multiple platforms • Deployment: public and private app stores • Security © 2013 IBM Corporation 21
  • 22. IBM is a mobile enterprise • 435,000 employees worldwide; 50% mobile • BYOD isn’t new at IBM and includes smartphone, tablets as well as laptops • 120,000 employees leveraging smartphones and tablets; 80,000 BYOD • 600,000 managed laptops/desktops; 30,000 BYOD • IBM embraces social computing IBM's BYOD program "really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business.“ - IBM CIO Jeanette Horan
  • 23. Video: IBM Mobile Technology – A Personal Journey http://www.youtube.com/watch?v=0sEaLyLjFag
  • 24. Mobile @ IBM • Legal Personally owned device terms and conditions • Policy Same overriding security policy for all endpoints (laptop, mobile, other) • Technical controls Detailed security settings per platform (“techspecs”)  Formal Mandatory Digital IBMer Security Training  Casual IBM Secure Computing Guidelines Targeted w3 articles  Social Secure Computing Forum Secure Computing Blog Posts  Developer Secure Engineering guidelines Mobile app security guidelines  Endpoint Management (overall control)  Anti-malware (malicious app protection)  Network access control & Application level security (data protection)  Containerization / Virtualization (data protection, data privacy, end user acceptance)  Mobile as primary  Personas (13 inside IBM)  BYOD policy (Windows, Linux, Mac, smartphones, tablets)
  • 25. Industry Solutions IBM & Partner Applications Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive Application & Data Platform Strategy&DesignServices Cloud & Managed Services Devices Network Servers Development&IntegrationServices Management AnalyticsSecurity IBM MobileFirst Offering Portfolio
  • 26. Industry Solutions IBM & Partner Applications Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive Application & Data Platform Cloud & Managed Services Devices Network Servers Development&IntegrationServices Management AnalyticsSecurity Strategy&DesignServices IBM MobileFirst Offering Portfolio
  • 27. To schedule a workshop, email: ibmmobile@us.ibm.com • Interactive discussion to understand client business drivers, pains and requirements • Overview of IBM MobileFirst Strategy, technology and POV’s • Industry trends and imperatives • Structured working session to outline next steps Client ValueWorkshop Highlights For Line of business and IT leaders seeking expertise and experience in developing, enhancing, and/or executing their mobile enterprise strategy. • Industry expertise with top use cases and successes • Capability assessment including identification of opportunities and gaps in mobile strategy • A detailed client report and next steps One day interactive workshop with an IBM mobile expert to help enterprises plan and develop a customized roadmap for success IBM MobileFirst Journey Workshop
  • 28. IBM MobileFirst Strategy & Design Services offer:  Customer journey mapping for mobile engagement  Accelerated mobile strategy and business case creation  Vision and delivery of compelling mobile web experience  Detailed strategies for infrastructure for mobile enterprise IT and communication initiatives For clients who need to:  Ensure mobile projects yield measurable business value  Link mobile investments to ROI and IT strategy  Establish plans for growth and maturity of mobile initiatives IBM MobileFirst Strategy & Design Services Key offerings:  IBM Interactive  IBM Mobile Infrastructure Strategy and Planning Services  Mobile Strategy Accelerator
  • 29. 5/22/2013 29 Interactive agency with a unique ability to imagine, discover and deliver compelling user experiences IBM Interactive
  • 30. Industry Solutions IBM & Partner Applications Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive Application & Data Platform Strategy&DesignServices Cloud & Managed Services Devices Network Servers Management AnalyticsSecurity Development&IntegrationServices IBM MobileFirst Offering Portfolio
  • 31. For clients who need to:  Develop new mobile applications  Integrate mobile applications with enterprise IT systems  Manage and secure mobile environments  Maintain visibility, control and automation of mobile devices IBM MobileFirst development services Key offerings:  IBM Mobile Application Development from the Cloud  IBM Mobility and Wireless Services IBM MobileFirst Development & Integration Services offer:  Fast cycle development of mobile applications across platforms  Mobile application integration for seamless connectivity and data management  Secure and seamless wired, wireless, cellular and WiFi network access including increased network bandwidth required for voice, data and video
  • 32. IBM On Demand Consulting for Mobile  For clients with development teams and some experience with Mobile projects  Fast path to expert help on Mobile development projects  Offerings customized to client skill level and requirements  Defined access to architects and technical experts for the IBM Mobile Enterprise Development Lifecycle  Sharing of Best Practices and Experiences to continually help improve client experience with Mobile development and implementation  Quarterly or yearly subscription Provides clients access to IBM’s technical experts for mobile
  • 33. Industry Solutions IBM & Partner Applications Banking Insurance Transport Telecom GovernmentRetail Healthcare Automotive Application & Data Platform Strategy&DesignServices Devices Network Servers Management AnalyticsSecurity Development&IntegrationServices Cloud & Managed Services IBM MobileFirst Offering Portfolio
  • 34. For clients who need to:  Manage complex IT infrastructures and/or multi-vendor mobile environments  Optimize IT resources across the extended enterprise  Address shortages or gaps in mobile IT skills IBM MobileFirst cloud and managed services Key offerings:  IBM Mobile Enterprise Services for managed mobility  IBM Mobile Enterprise Services – Mobile Application Platform Management IBM Cloud and Managed Services offer:  Flexible and scalable compute power with access to greater network bandwidth  Predictable allocation of, and investment in, current skills and IT resources that support mobile initiatives  Multi-vendor integration and device support  Highly efficient coordination of global mobile projects
  • 35.  Deploy and manage a security-rich enterprise mobility strategy for both BYOD and corporate issued devices  Comprehensive approach to managing devices via mobile device management platform, tools and services  Secure corporate data and enhance compliance and consistency  Includes mobile messaging software to perform two-way synchronization of email, contact and calendar IBM MobileFirst managed mobility services Smartphones, tablets and rugged devices acquired, distributed and managed for you with subscription-based pricing
  • 36. The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Breadth and Depth are Today’s Differentiators in Enterprise Mobility Services “Today’s enterprise mobility market comprises many different providers, ranging from the agencies that specialize in user interface (UI)/ design work to development boutiques to large multinationals. However, few truly have the scale across the life cycle of services, from user interface and design skills to business acumen to mobile technology expertise.” Source: Forrester Research Inc. “Forrester WaveTM”: Enterprise Mobility Services, Q1 2013” Full report can be accessed at http://www.ibm.com Forrester WaveTM Enterprise Mobility Services names IBM a leader for 1Q2013
  • 37.
  • 38. IBM services map to business needs © 2013 IBM Corporation 38
  • 39. IBM mobile partnerships and alliances
  • 40. Connect to backend systems in support of mobile Manage mobile devices and applications Transform the business by creating new opportunities Extend existing business capabilities to mobile devices Build mobile applications Secure your mobile business Assess and Plan enterprise mobile strategy Start with a consulting assessment IBM Global Technology Services offers solutions to address the complete mobile lifecycle
  • 41. Questions? Chris Pepin Mobile Enterprise Executive IBM Global Technology Services cpepin@us.ibm.com @chrispepin
  • 42. © IBM Corporation 2012. All Rights Reserved. IBM, the IBM logo, ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. Copyright and Trademarks 42© 2013 IBM Corporation
  • 43. • Go to summitsmartsite.com from your mobile device or log on to SmartSite at any Kiosk at the event: • Select the Survey icon • Complete the surveys for the sessions you attended • Submit your feedback © 2013 IBM Corporation We appreciate your feedback. Please don’t forget to fill out your evaluation Thank you for joining us! 43
  • 44.  Visit the Smarter Commerce demos in the Solutions Center  Schedule an Executive One-on-One  Spend time with a subject matter expert at Meet the Experts  Set up your Twitter account at the Social Media Command Center  Sign up to be a reference at our Client Reference Lounge  Participate in our Hands-on Labs and Certification Testing Find out more… Check SmartSite from your phone, computer, or on-site kiosks for details on these programs and more.