Running a successful BYOD Initiative Albee Jhoney Hari H Krishna © 2013 International Business Machines Corporation 1 Life was so much easier when everyone simply had a Blackberry Share of global Q1 2012 smartphone sales to end users, by OS • Android and iOS accounted for 79% of all smartphone shipments • Many employees want to use their devices to access work information • Mobile devices offer significant advantages for companies • ‘Halo effect’ of Apple Mac’s • Before companies can realise the benefits of mobile devices, they need to be able to manage the associated risks Source: Gartner 2012; does not include media tablets © 2013 International Business Machines Corporation 2 IT manages risks by maintaining control points © 2013 International Business Machines Corporation 3 With BYOD, IT loses control © 2013 International Business Machines Corporation 4 PCs and mobile devices have many of the same management needs Traditional Endpoint Management OS provisioning Device inventory Patching Security policy mgmt Power Mgmt Application mgmt Mobile Device Management Device config (VPN/Email/Wifi) Device Wipe Location info Jailbreak/Root detection Enterprise App store Self-service portal Encryption mgmt Roaming device support Integration with internal systems Scalable/Secure solution Easy-to-deploy Multiple OS support Consolidated infrastructure “Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types” – Gartner, PCCLM Magic Quadrant, January 2011 © 2013 International Business Machines Corporation 5 Managing Mobile Devices – The Problem Potential unauthorized access (lost, stolen) End User Disabled encryption Insecure devices connecting to network Corporate data leakage • • • • Mail / Calendar / Contacts Access (VPN / WiFi) Apps (app store) Enterprise Apps VPN / WiFi Corporate Network Access Encryption not enforced iCloud iCloud Sync iTunes Sync 6 © 2013 International Business Machines Corporation 6 Managing Mobile Devices – The Solution Enforce password policies Secured by BigFix policy End User Enable device encryption Force encrypted backup Disable iCloud sync • Personal Mail / Calendar • Personal Apps Corporate Profile Access to corporate email, • Enterprise Mail / Calendar apps, VPN, WiFi contingent on • Enterprise Access (VPN/WiFi) • Enterprise Apps (App store or policy compliance! VPN / WiFi Custom) Selectively wipe corporate data if employee leaves company Corporate Network Access Encryption Enabled iCloud Fully wipe if lost or stolen iCloud Sync iTunes Sync © 2013 International Business Machines Corporation 7 IBM understands the demands of managing a global heterogeneous IT infrastructure with BYOD • 430,000 IBM employees in over 120 countries. • Deployment to over 750,000 endpoints • A 78 per cent decrease in endpoint security issues • IBM is also in the process of deploying Mobile Device Management solution across its entire mobile workforce of over 120,000 staff • BYOD with 200,000+ smartphones projected • 2099+ Terabytes of WAN traffic per month © 2013 International Business Machines Corporation 8 Mobile Device Management Services: Benefits: • Providing enterprise-wide visibility (eg. device details, apps installed, device location) • Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments • Ensuring data security and compliance • Device configuration • Manage enterprise and personal data separately with capabilities such as selective wipe • Support devices on the Apple iOS, Google Android, Microsoft Windows Phone, Blackberry, Nokia Symbian • Leverage a single infrastructure to manage all enterprise devices—smartphones, tablets, desktops, laptops and servers “IBM's MDM capability is very complementary to that of PCs, and it is one of the few vendors in this Magic Quadrant that can support PCs and mobile devices” Gartner, MQ for Mobile Device Management Software, 2012 © 2013 International Business Machines Corporation Apple iOS Google Android Windows Phone Blackberry Nokia Symbian Windows Mobile 9 Implement BYOD With Confidence How do I deal with the business mandate that employees be allowed to "Bring Your Own Device"? • App container. Deploy, manage, configure, and remove Enterproid Divide containers to separate personal and work environments on iOS and Android devices • PIM container. Separate personal and corporate email and prevent sensitive data from being copied into other apps with NitroDesk TouchDown integration • Dual-persona OS. Manage BlackBerry 10 devices, which provide a native user experience to personal and work personas • Extend BYOD to laptops. Unified device management approach brings together containers, smartphones, tablets, laptops, desktops, and servers under one infrastructure © 2013 International Business Machines Corporation Manage and secure only the apps and data inside the enterprise container, leaving users free to control the personal side of their device with Enterproid Divide. 10 Handle Multi-Platform Complexities With Ease How do I manage an ever-expanding list of OS and hardware platforms when the user controls what apps are loaded and the carrier controls when the OS is updated? • Device management via Android agent, iOS APIs, Lotus Traveler, Microsoft Exchange, and Office 365 • Complete device hardware and software inventory in near real-time • Web reports provide at-a-glance mobile device deployment overviews • Pass mobile device data to network management, service desk, asset management, and security and compliance systems Better plan internal mobile projects with easy access to near-real time data about your mobile environment. © 2013 International Business Machines Corporation • Multi-tenancy support for service providers and organizations that need to completely separate different parts of the organization 11 Secure Sensitive Data, Regardless of the Device How do I ensure the security of mobile devices as they access more and more sensitive systems? • Unified compliance reporting across all devices, including CIS Benchmarks • Configure security settings such as password policy, encryption, WiFi, iCloud sync • Full wipe, remote lock, map device location, and clear passcode options if device is lost or stolen • Blacklist apps and automate alerts, policy response • Detect jailbroken / rooted devices to notify users, disable access • Integrate with mobile VPN and access management tools to ensure only compliant devices are authorized © 2013 International Business Machines Corporation Multiple user communication and alert methods, including Google Cloud Messaging (GCM), enables users to be part of the security solution. 12 Minimize Administration Costs How do I cost-effectively manage the sheer volume of these tiny devices with average replacement rates of 12-18 months? • Multiple authenticated device enrollment options, including LDAP/AD integration • Employee self-service portal to enable employees to protect personal and enterprise data • Enterprise app store directs employees to approved apps, includes support for Apple’s Volume Purchase Program (Apple VPP) • Integration with IBM Worklight for 1click transfer of internally-developed mobile apps from dev to production • A ‘single device view’ enables IT personnel to easily view device details and take required action © 2013 International Business Machines Corporation A flexible enrollment process enables organizations to include a EULA and to collect critical device and employee data via customizable questions 13 IBM Endpoint Manager Continuously monitors the health and security of all enterprise endpoint in real-time via a single, policy-driven agent Endpoints Desktop / laptop / server endpoint Mobile Purpose specific • Common management agent • Unified management console • Common infrastructure Patch Management Lifecycle Management Software Use Analysis Mobile Devices Power Management Core Protection Server Automation Security and Compliance Systems Management • Single server Security Management IBM Endpoint Manager © 2013 International Business Machines Corporation 14 IBM Endpoint Manager for Mobile Devices Functionality Overview Category Endpoint Manager Capabilities Platform Support Apple iOS, Google Android, Windows Phone, Blackberry, Symbian, Windows Mobile Management Actions Selective/full wipe, deny email access, remote lock, user notification, clear passcode Application Management Application inventory, enterprise app store, iOS WebClips, whitelisting/blacklisting Policy and Security Management Password policies, Samsung SAFE, device encryption, jailbreak/root detection Location Services Track devices and locate on map Enterprise Access Management Configuration of Email, VPN, Wi-Fi, Authenticated Enrollment, Self Service Portal Expense Management Enable/disable voice and data roaming Cloud Email Device Management Office 365 support Containerisation Nitrodesk Touchdown (Android), Enterproid Divide, Red Bend © 2013 International Business Machines Corporation 15 How it Works Identify unmanaged assets Lightweight, Robust Infrastructure Remote Offices • Use existing systems as Relays • Built-in redundancy • Support/secure roaming endpoints Cloud-based Content Delivery • Highly extensible • Automatic, on-demand functionality Single Server & Console • Highly secure, highly scalable • Aggregates data, analyzes & reports • Pushes out pre-defined/custom policies Single Intelligent Agent • Performs multiple functions • Continuous self-assessment & policy enforcement • Minimal system impact (< 2% CPU) © 2013 International Business Machines Corporation Manage roaming devices 16 Authenticated Enrollment and Self Service portal A flexible enrollment process can include an EULA and collect critical device and employee data via customisable questions © 2013 International Business Machines Corporation 17 Authenticated Enrollment and Self Service portal © 2013 International Business Machines Corporation 18 Complete device hardware and software inventory © 2013 International Business Machines Corporation 19 Last known location of the device © 2013 International Business Machines Corporation 20 Create your own Enterprise AppStore 21 © 2013 International Business Machines Corporation 21 Secure the device A unified report of password policies across all mobile OS’ makes it easy for administrators to identify non-compliant devices © 2013 International Business Machines Corporation 22 Secure the device © 2013 International Business Machines Corporation 23 Endpoint Manager for Mobile Devices, Part of IBM MobileFirst Industry Solutions Insurance Retail Transport Telecom Government Healthcare Automotive IBM & Partner Applications Application & Data Application Platform and Platform Data Services Management Devices Security Network Analytics Development & Integration Services Strategy & Design Services Banking Servers Cloud & Managed Services © 2013 International Business Machines Corporation 24 Stanford University uses IBM Endpoint to support it’s large BYOD environment of over 45,000 endpoints Stanford University • Palo Alto, California • Population: 30,000 • 45,000+ End Points © 2013 International Business Machines Corporation The solution • • • • • • • • Opt-in Power Management Security Patching (Windows / Mac) Inventory Anti Malware Application Updates Software deployment Laptop Recovery PGP Whole Disk Encryption Benefits • Rapid Operating System Patching and Compliance (across Windows and OS X) • Accurate IT asset inventory • Power Savings: Pacific Gas & Electric Rebate ~$70,000 May 2009 https://itservices.stanford.edu/service/bigfix 25 Large Healthcare Provider Extending the reach of healthcare This innovative healthcare provider in the southeastern United States is piloting a program to improve patient outcomes by providing secure healthcare support remotely through mobile devices, such as: Home Health Care: iPads provided to Home Healthcare diabetes patients to enable direct input of diagnostic data; Face time sessions with home health nurses reduce the need for on-site visits, which improves nurse utilization while reducing costs Education: iPod Touches with pre-loaded educational apps provided to parents of babies in Neonatal Intensive Care Unit (NICU) Customer Needs Key Features & Outcomes Consolidate management of endpoints – PCs, laptops, mobile devices This regional healthcare provider uses IBM Endpoint Manager for its unified approach to endpoint management HIPAA compliance Minimize on-going operational costs Minimize device replacement costs © 2013 International Business Machines Corporation 1 employee is able to manage and secure 30,000 PCs + 4,000 mobile devices 26 Mobile Device Management Services: Benefits: • Providing enterprise-wide visibility (eg. device details, apps installed, device location) • Address business and technology issues of security, complexity and bring your own device (BYOD) in mobile environments • Ensuring data security and compliance • Device configuration • Manage enterprise and personal data separately with capabilities such as selective wipe • Support devices on the Apple iOS, Google Android, Microsoft Windows Phone, Blackberry, Nokia Symbian • Leverage a single infrastructure to manage all enterprise devices—smartphones, tablets, desktops, laptops and servers “IBM's MDM capability is very complementary to that of PCs, and it is one of the few vendors in this Magic Quadrant that can support PCs and mobile devices” Gartner, MQ for Mobile Device Management Software, 2012 © 2013 International Business Machines Corporation Apple iOS Google Android Nokia Symbian Windows Phone Blackberry Windows Mobile 27 ibm.com © 2013 International Business Machines Corporation 28 Legal Disclaimer • © IBM Corporation 2012 All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only. © 2013 International Business Machines Corporation 29 Backup © 2013 International Business Machines Corporation 30 IBM Endpoint Manager for Mobile Devices Architecture Google Cloud Messaging (optional) IEM Server Apple Push Notification Servers DB Consolidated Reports / Management Lotus Traveler / Exchange Server TEM Relay Mgmt Extender for iOS Agent Comms / Management APIs ActiveSync ActiveSync Management by Email 31 © 2013 International Business Machines Corporation Fully-Managed Devices 31 IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager’s cloud-based content delivery system enables customers to benefit from frequent feature enhancements without the difficulty of performing upgrades Integration with Enterproid’s Divide container technologies for iOS and Android Web-based administration console for performing basic device management tasks with role-based access control Integration with BlackBerry Enterprise Server for integrated support of BlackBerry v4 – v7 devices Enhanced security with support for FIPS 140-2 encryption and bi-directional encryption of communications with Android agent Additional Samsung SAFE APIs for expanded management and security of SAFE devices SmartCloud Notes & Notes Traveler 9.0 support, including cloud and highavailability versions © 2013 International Business Machines Corporation 32 Jailbreak / Root Detection – Warn Users, Notify Administrators, Take Action © 2013 International Business Machines Corporation 33 IBM announced same-day support for Apple iOS6 New MDM features in iOS6 • Ability to set a device-level proxy (only works in "Supervise mode") • Single-app mode. Ability to set a "Locked App" like a "Kiosk Mode" • Some new restrictions like the ability to disable Game Centre • Configure a profile to automatically be removed at a specified date • Disable recent contacts from syncing for a given email account • Disable passbook while device is locked • Disable shared photo streams © 2013 International Business Machines Corporation 34 Delivering for multiple mobile platforms IBM Worklight Fast and cost-effective development, integration and management of rich, cross-platform mobile applications Client Challenge Using standards-based technologies and tools and delivering an enterprise-grade services layer that meets the needs of mobile employees and customers Key Capabilities Encrypted cache on-device • A mechanism for storing sensitive data on the client side • Encrypted - like a security deposit box © 2013 International Business Machines Corporation Mobile optimised middleware • Open approach to 3rd-party integration • Mix native and HTML • Strong authentication framework • Encrypted offline availability • Enterprise back-end connectivity • Unified push notifications • Data collection for analytics • Direct updates and remote disablement • Packaged runtime skins 35