20
© 2015 IBM Corporation Fliplet, Tata Communications and IBM Ian Broom, Fliplet Anupam Katkar, Tata Communications Kaushik Srinivas, IBM November 19, 2015 Enterprise Apps: Boosting Secure Mobile Productivity

Enterprise Apps: Boosting Secure Mobile Productivity

Embed Size (px)

Citation preview

Page 1: Enterprise Apps: Boosting Secure Mobile Productivity

© 2015 IBM Corporation

Fliplet, Tata Communications and IBM

Ian Broom, Fliplet

Anupam Katkar, Tata Communications

Kaushik Srinivas, IBM

November 19, 2015

Enterprise Apps: Boosting Secure Mobile Productivity

Page 2: Enterprise Apps: Boosting Secure Mobile Productivity

2 © 2015 IBM Corporation

Housekeeping items

Duration – 60 minutes

Submit your questions to all

panelists in the Q&A box located

in the bottom right corner of your

screen

Recording and slides will be

emailed to you

Page 3: Enterprise Apps: Boosting Secure Mobile Productivity

3 © 2015 IBM Corporation

Agenda

• Mobile Application and Data Security • Drivers for separation of work data on mobile devices

• App containerization

• SDK and App Wrapping

• Fliplet • Rapidly build apps

• Enhance security with MaaS360

• Customer success story - Tata Communications

• Q&A

Mobile App

Lifecycle

Design

Develop

Secure

Deploy

Manage

Page 4: Enterprise Apps: Boosting Secure Mobile Productivity

© 2015 IBM Corporation

Mobile Application & Data Security Kaushik Srinivas, IBM

Page 5: Enterprise Apps: Boosting Secure Mobile Productivity

5 © 2015 IBM Corporation

Protect sensitive corporate data

Deploy public and enterprise apps

Provide access to work content

Top enterprise mobility initiatives

5

Embrace Bring Your Own Device (BYOD)

Migrate from BlackBerry to multi-OS

Page 6: Enterprise Apps: Boosting Secure Mobile Productivity

6 © 2015 IBM Corporation

Dual Persona to Separate Work and Personal

Secure Mail

Application Security

Secure Browser

Secure Document Sharing

6

WorkPlace Container for Mobile Collaboration

Page 7: Enterprise Apps: Boosting Secure Mobile Productivity

7 © 2015 IBM Corporation

Enterprises need ability to secure corporate data on any smartphone or tablet

First phase - Email, Calendar, Contacts and

Browser

The next stage of EMM evolution is securing other

work apps and providing easy access to back end

resources

Application Security SDK or wrapping can achieve

this for both in-house Enterprise apps and Public

apps

7

Page 8: Enterprise Apps: Boosting Secure Mobile Productivity

8 © 2015 IBM Corporation

Incorporate security right from the beginning

App Wrapping

Post-development

code injection

Software Dev. Kit (SDK)

Use libraries as part of

development

• Authentication & Single Sign On

• Data Loss Prevention (DLP) - Restrict copy-paste

- Open-in controls

• Per-app VPN

• Block usage on non-compliance

• Data encryption

Page 9: Enterprise Apps: Boosting Secure Mobile Productivity

9 © 2015 IBM Corporation

The app wrapping process

Upload app to MaaS360 MAM portal

Wrap the app with

configurable security

layer

App available on Enterprise app store

App deployed to

user

User specific policy

applied to app on device

9

Application wrapping secures enterprise apps with a layer of corporate

policies, with zero coding by customer

*Per-app VPN requires MaaS360 Mobile Enterprise Gateway

Page 10: Enterprise Apps: Boosting Secure Mobile Productivity

10 © 2015 IBM Corporation

Deploy using the Enterprise App Store

• Consolidated Management

interface independent of OS

• Deploy and update apps without

delay

• Integrate with existing

infrastructure (Ex: Active

Directory)

• Control app security through

policies

• Version control of apps

Page 11: Enterprise Apps: Boosting Secure Mobile Productivity

11 © 2015 IBM Corporation

Manage - App Discovery and Collaboration

Web-based App Catalog for

Mobile Apps

Discovery portal for all

platforms

User sharing and linking of

apps

User application review and

rating system

Page 12: Enterprise Apps: Boosting Secure Mobile Productivity

© 2015 IBM Corporation

App Security with Fliplet Ian Broom, Fliplet

Page 13: Enterprise Apps: Boosting Secure Mobile Productivity

www.Fliplet.com

How Fliplet helps companies

rapidly produce enterprise mobile

apps

Page 14: Enterprise Apps: Boosting Secure Mobile Productivity

www.Fliplet.com

How Maas360 helps Fliplet

customers secure their apps

Page 15: Enterprise Apps: Boosting Secure Mobile Productivity

www.Fliplet.com

Example apps built with Fliplet

• internal communication/news

• emergency management/disaster recovery

• contact directory

• sales support

• training

• events

• reporting

Page 16: Enterprise Apps: Boosting Secure Mobile Productivity

www.Fliplet.com

How customers scale their use of

Fliplet

• 15 min training

• No development or design skills

• Decentralised app creation

• Integrate other systems

• Host in cloud, private cloud or on-premise

• IT enforce compliance, standards and governance

Page 17: Enterprise Apps: Boosting Secure Mobile Productivity

www.Fliplet.com

The Insider App

Welcome screen Drop-down menu

Page 18: Enterprise Apps: Boosting Secure Mobile Productivity

©2008 Tata Communications, Ltd. All Rights Reserved

Anupam Katkar, Tata Communications

MaaS360 and the Insider App

at Tata Communications

Page 19: Enterprise Apps: Boosting Secure Mobile Productivity

19 © 2015 IBM Corporation

Would you like more information?

– Yes, please have Fliplet

– Yes, please have MobileFirst Protect reach out

– Yes, please have both Fliplet and MobileFirst Protect reach out

– No, not at this time

Final Poll Placeholder

Page 20: Enterprise Apps: Boosting Secure Mobile Productivity

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU www.ibm.com/security