18
© 2013 IBM Corporation IBM Endpoint Manager and Enterproid Divide Jude J. Lancaster Product Manager May 28, 2013

Securing the Mobile Enterprise

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Securing the Mobile Enterprise

© 2013 IBM Corporation

IBM Endpoint Manager and Enterproid Divide Jude J. Lancaster Product Manager

May 28, 2013

Page 2: Securing the Mobile Enterprise

1

1

ENTERPRISE MOBILITY EVOLUTION

Mobile Device

Management (MDM) Mobile Application

Management (MAM)

NOC-reliant

email solutions

V1.0 V1.5 V2.0

Secure Persona &

Virtualization

Page 3: Securing the Mobile Enterprise

2

2

NEXT GENERATION MOBILITY

Mobile meets Cloud

• Securely enable and

accelerate BYOD

mobility

• Mobilize every

employee with secure

connectivity to apps

and services

• Scale without limits,

without infrastructure

costs

Page 4: Securing the Mobile Enterprise

3

Page 5: Securing the Mobile Enterprise

4

IBM ENDPOINT MANAGER + DIVIDE

Complete MDM BYOD Solution

Dual Persona

Leverages the sophisticated policies and

features of IBM MDM and Endpoint

Management

Management of Divide as a “virtual device”

including safe, secure distribution and

management of apps

+ +

Immediate solution for BYOD challenges

and security concerns for Mobility OS’s

Seamless delivery: same Divide App,

binding to IBM MDM at time of enrollment

Business Apps IBM Endpoint Manager

Page 6: Securing the Mobile Enterprise

5

DUAL PERSONA IS FOUNDATIONAL

SEPARATE & SECURE PERSONAS

• Data security

• Enterprise apps and services

• Easy to manage and control

• Native user experience

• Choice of device, services

• Freedom and privacy

Page 7: Securing the Mobile Enterprise

6

2 U.K.-based analyst firm Gfk

WHAT USERS WANT

Choice of native user experience

PERSONAL WORKSPACE ENTER

PASSCODE

Tap Divide app icon

Double tap Home button to access Divide

When asked why users are

loyal to their smartphones,

72% cited ease of use and

the ability to quickly

navigate their phone's

menu.”

Page 8: Securing the Mobile Enterprise

7

7

WHAT IT ORGANIZATIONS NEED FOR BYOD

Divide Container Security

Data Protection

• Device PIN/passcode

• Passcode history and complexity

• Passcode failure actions

• FIPS 140-2 validated encryption

• Full and selective device wipe

• Wipe on SIM removal/rooted

• VPN support

• S/MIME support

OTA Self-Service Provisioning

• ActiveSync email

• VPN configuration

Container Controls

• Whitelisting – application push

• Blacklisting

• Location based services

• Data leakage prevention

• URL blocking

Compliance Management and Reporting

• Device hardware

• Operating system

• Policy compliance

• Compromised device status

• Voice, Data, and SMS usage reporting

Page 9: Securing the Mobile Enterprise

8

4 Mobilewalla Dec 2011 8

• Professional-grade email, contacts, calendar and browser

• Data-at-rest is protected with AES 256 bit encryption

• Data-in-motion leverages existing VPN investments

• Secure cloud based file storage (optional)

• Separate voice and messaging (including future 2-number UC)

• Internally developed apps uploaded and assigned via policy – in minutes and with

no developer modifications

• Divide App security automatically provides data-at-rest AES-256 bit encryption

• Divide Extensions provide extraordinary integration with 3rd party Apps and Cloud services

GEARED FOR INNOVATION

Leveraging the App Ecosystem

STANDARD DIVIDE APPS THIRD PARTY APPS

Page 10: Securing the Mobile Enterprise

9

EXTENSIBLE FOR THE FUTURE

9

Page 11: Securing the Mobile Enterprise

10

THE RIGHT SOLUTION FOR BYOD?

A first generation

solution purpose-built for email sync

A next generation

solution purpose-built

for BYOD

Device Management

X

✔ Manages the

Divide workspace

and integrates with IBM Endpoint

Manager for device MDM

Does not integrate with

deployed MDM

solutions

Secure “Workspace”

X

Provides a secure

workspace that preserves the native iOS and Android

user experience

Provides an email sandbox

with a proprietary

user interface

Secure VPN

X

Provides VPN connectivity between the workspace

and corporate apps

No VPN integration -

all data traverses the

Good NOC

App Choice

X

App wrapper technology enables the use of any third party

app within the workspace

Third-party apps must be modified and recompiled using the

Good SDK ($)

Avg TCO/ User

$$$$

$$$$

$

Page 12: Securing the Mobile Enterprise

11

Screenshots of Android application Android – Samsung Galaxy S4 GT-9505

Page 13: Securing the Mobile Enterprise

12

Page 14: Securing the Mobile Enterprise

13

Page 15: Securing the Mobile Enterprise

14

Page 16: Securing the Mobile Enterprise

15

Page 17: Securing the Mobile Enterprise

16

Page 18: Securing the Mobile Enterprise

17