Enterprise Apps: Boosting Secure Mobile Productivity

  • Published on
    10-Apr-2017

  • View
    272

  • Download
    1

Embed Size (px)

Transcript

<ul><li><p> 2015 IBM Corporation </p><p>Fliplet, Tata Communications and IBM </p><p>Ian Broom, Fliplet </p><p>Anupam Katkar, Tata Communications </p><p>Kaushik Srinivas, IBM </p><p>November 19, 2015 </p><p>Enterprise Apps: Boosting Secure Mobile Productivity </p></li><li><p>2 2015 IBM Corporation </p><p>Housekeeping items </p><p>Duration 60 minutes </p><p>Submit your questions to all </p><p>panelists in the Q&amp;A box located </p><p>in the bottom right corner of your </p><p>screen </p><p>Recording and slides will be </p><p>emailed to you </p></li><li><p>3 2015 IBM Corporation </p><p>Agenda </p><p> Mobile Application and Data Security Drivers for separation of work data on mobile devices </p><p> App containerization </p><p> SDK and App Wrapping </p><p> Fliplet Rapidly build apps </p><p> Enhance security with MaaS360 </p><p> Customer success story - Tata Communications </p><p> Q&amp;A </p><p>Mobile App </p><p>Lifecycle </p><p>Design </p><p>Develop </p><p>Secure </p><p>Deploy </p><p>Manage </p></li><li><p> 2015 IBM Corporation </p><p>Mobile Application &amp; Data Security Kaushik Srinivas, IBM </p></li><li><p>5 2015 IBM Corporation </p><p>Protect sensitive corporate data </p><p>Deploy public and enterprise apps </p><p>Provide access to work content </p><p>Top enterprise mobility initiatives </p><p>5 </p><p>Embrace Bring Your Own Device (BYOD) </p><p>Migrate from BlackBerry to multi-OS </p></li><li><p>6 2015 IBM Corporation </p><p>Dual Persona to Separate Work and Personal </p><p>Secure Mail </p><p>Application Security </p><p>Secure Browser </p><p>Secure Document Sharing </p><p>6 </p><p>WorkPlace Container for Mobile Collaboration </p></li><li><p>7 2015 IBM Corporation </p><p>Enterprises need ability to secure corporate data on any smartphone or tablet </p><p> First phase - Email, Calendar, Contacts and </p><p>Browser </p><p> The next stage of EMM evolution is securing other </p><p>work apps and providing easy access to back end </p><p>resources </p><p> Application Security SDK or wrapping can achieve </p><p>this for both in-house Enterprise apps and Public </p><p>apps </p><p>7 </p></li><li><p>8 2015 IBM Corporation </p><p>Incorporate security right from the beginning </p><p> App Wrapping </p><p>Post-development </p><p>code injection </p><p>Software Dev. Kit (SDK) </p><p>Use libraries as part of </p><p>development </p><p> Authentication &amp; Single Sign On </p><p> Data Loss Prevention (DLP) - Restrict copy-paste </p><p>- Open-in controls </p><p> Per-app VPN </p><p> Block usage on non-compliance </p><p> Data encryption </p></li><li><p>9 2015 IBM Corporation </p><p>The app wrapping process </p><p>Upload app to MaaS360 MAM portal </p><p>Wrap the app with </p><p>configurable security </p><p>layer </p><p>App available on Enterprise app store </p><p>App deployed to </p><p>user </p><p>User specific policy </p><p>applied to app on device </p><p>9 </p><p>Application wrapping secures enterprise apps with a layer of corporate </p><p>policies, with zero coding by customer </p><p>*Per-app VPN requires MaaS360 Mobile Enterprise Gateway </p></li><li><p>10 2015 IBM Corporation </p><p>Deploy using the Enterprise App Store </p><p> Consolidated Management </p><p>interface independent of OS </p><p> Deploy and update apps without </p><p>delay </p><p> Integrate with existing </p><p>infrastructure (Ex: Active </p><p>Directory) </p><p> Control app security through </p><p>policies </p><p> Version control of apps </p></li><li><p>11 2015 IBM Corporation </p><p>Manage - App Discovery and Collaboration </p><p> Web-based App Catalog for </p><p>Mobile Apps </p><p> Discovery portal for all </p><p>platforms </p><p> User sharing and linking of </p><p>apps </p><p> User application review and </p><p>rating system </p></li><li><p> 2015 IBM Corporation </p><p>App Security with Fliplet Ian Broom, Fliplet </p></li><li><p>www.Fliplet.com </p><p>How Fliplet helps companies </p><p>rapidly produce enterprise mobile </p><p>apps </p></li><li><p>www.Fliplet.com </p><p>How Maas360 helps Fliplet </p><p>customers secure their apps </p></li><li><p>www.Fliplet.com </p><p>Example apps built with Fliplet </p><p> internal communication/news </p><p> emergency management/disaster recovery </p><p> contact directory </p><p> sales support </p><p> training </p><p> events </p><p> reporting </p></li><li><p>www.Fliplet.com </p><p>How customers scale their use of </p><p>Fliplet </p><p> 15 min training </p><p> No development or design skills </p><p> Decentralised app creation </p><p> Integrate other systems </p><p> Host in cloud, private cloud or on-premise </p><p> IT enforce compliance, standards and governance </p></li><li><p>www.Fliplet.com </p><p>The Insider App </p><p>Welcome screen Drop-down menu </p></li><li><p>2008 Tata Communications, Ltd. All Rights Reserved </p><p>Anupam Katkar, Tata Communications </p><p>MaaS360 and the Insider App </p><p>at Tata Communications </p></li><li><p>19 2015 IBM Corporation </p><p> Would you like more information? </p><p> Yes, please have Fliplet </p><p> Yes, please have MobileFirst Protect reach out </p><p> Yes, please have both Fliplet and MobileFirst Protect reach out </p><p> No, not at this time </p><p>Final Poll Placeholder </p></li><li><p> Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any </p><p>kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor </p><p>shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use </p><p>of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or </p><p>capabilities referenced in these materials may change at any time at IBMs sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product </p><p>or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries </p><p>or both. Other company, product, or service names may be trademarks or service marks of others. </p><p>Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside </p><p>your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks </p><p>on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. </p><p>IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other </p><p>systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE </p><p>IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. </p><p>THANK YOU www.ibm.com/security </p><p>http://www.ibm.com/securityhttp://www.ibm.com/security</p></li></ul>

Recommended

View more >