Enterprise Apps: Boosting Secure Mobile Productivity

  • Published on
    10-Apr-2017

  • View
    272

  • Download
    1

Embed Size (px)

Transcript

  • 2015 IBM Corporation

    Fliplet, Tata Communications and IBM

    Ian Broom, Fliplet

    Anupam Katkar, Tata Communications

    Kaushik Srinivas, IBM

    November 19, 2015

    Enterprise Apps: Boosting Secure Mobile Productivity

  • 2 2015 IBM Corporation

    Housekeeping items

    Duration 60 minutes

    Submit your questions to all

    panelists in the Q&A box located

    in the bottom right corner of your

    screen

    Recording and slides will be

    emailed to you

  • 3 2015 IBM Corporation

    Agenda

    Mobile Application and Data Security Drivers for separation of work data on mobile devices

    App containerization

    SDK and App Wrapping

    Fliplet Rapidly build apps

    Enhance security with MaaS360

    Customer success story - Tata Communications

    Q&A

    Mobile App

    Lifecycle

    Design

    Develop

    Secure

    Deploy

    Manage

  • 2015 IBM Corporation

    Mobile Application & Data Security Kaushik Srinivas, IBM

  • 5 2015 IBM Corporation

    Protect sensitive corporate data

    Deploy public and enterprise apps

    Provide access to work content

    Top enterprise mobility initiatives

    5

    Embrace Bring Your Own Device (BYOD)

    Migrate from BlackBerry to multi-OS

  • 6 2015 IBM Corporation

    Dual Persona to Separate Work and Personal

    Secure Mail

    Application Security

    Secure Browser

    Secure Document Sharing

    6

    WorkPlace Container for Mobile Collaboration

  • 7 2015 IBM Corporation

    Enterprises need ability to secure corporate data on any smartphone or tablet

    First phase - Email, Calendar, Contacts and

    Browser

    The next stage of EMM evolution is securing other

    work apps and providing easy access to back end

    resources

    Application Security SDK or wrapping can achieve

    this for both in-house Enterprise apps and Public

    apps

    7

  • 8 2015 IBM Corporation

    Incorporate security right from the beginning

    App Wrapping

    Post-development

    code injection

    Software Dev. Kit (SDK)

    Use libraries as part of

    development

    Authentication & Single Sign On

    Data Loss Prevention (DLP) - Restrict copy-paste

    - Open-in controls

    Per-app VPN

    Block usage on non-compliance

    Data encryption

  • 9 2015 IBM Corporation

    The app wrapping process

    Upload app to MaaS360 MAM portal

    Wrap the app with

    configurable security

    layer

    App available on Enterprise app store

    App deployed to

    user

    User specific policy

    applied to app on device

    9

    Application wrapping secures enterprise apps with a layer of corporate

    policies, with zero coding by customer

    *Per-app VPN requires MaaS360 Mobile Enterprise Gateway

  • 10 2015 IBM Corporation

    Deploy using the Enterprise App Store

    Consolidated Management

    interface independent of OS

    Deploy and update apps without

    delay

    Integrate with existing

    infrastructure (Ex: Active

    Directory)

    Control app security through

    policies

    Version control of apps

  • 11 2015 IBM Corporation

    Manage - App Discovery and Collaboration

    Web-based App Catalog for

    Mobile Apps

    Discovery portal for all

    platforms

    User sharing and linking of

    apps

    User application review and

    rating system

  • 2015 IBM Corporation

    App Security with Fliplet Ian Broom, Fliplet

  • www.Fliplet.com

    How Fliplet helps companies

    rapidly produce enterprise mobile

    apps

  • www.Fliplet.com

    How Maas360 helps Fliplet

    customers secure their apps

  • www.Fliplet.com

    Example apps built with Fliplet

    internal communication/news

    emergency management/disaster recovery

    contact directory

    sales support

    training

    events

    reporting

  • www.Fliplet.com

    How customers scale their use of

    Fliplet

    15 min training

    No development or design skills

    Decentralised app creation

    Integrate other systems

    Host in cloud, private cloud or on-premise

    IT enforce compliance, standards and governance

  • www.Fliplet.com

    The Insider App

    Welcome screen Drop-down menu

  • 2008 Tata Communications, Ltd. All Rights Reserved

    Anupam Katkar, Tata Communications

    MaaS360 and the Insider App

    at Tata Communications

  • 19 2015 IBM Corporation

    Would you like more information?

    Yes, please have Fliplet

    Yes, please have MobileFirst Protect reach out

    Yes, please have both Fliplet and MobileFirst Protect reach out

    No, not at this time

    Final Poll Placeholder

  • Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

    kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

    shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

    of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

    capabilities referenced in these materials may change at any time at IBMs sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

    or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

    or both. Other company, product, or service names may be trademarks or service marks of others.

    Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

    your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

    on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

    IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

    systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

    IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

    THANK YOU www.ibm.com/security

    http://www.ibm.com/securityhttp://www.ibm.com/security

Recommended

View more >