Post on 09-May-2015
description
© 2012 IBM Corporation@IBMMobile | #IBMatMobileCon
Becoming a mobile enterprise step by step
Chris PepinIBM Global Mobile Offering Manager and Evangelist
© 2012 IBM Corporation2 @IBMMobile | #IBMatMobileCon
Mobile is growing exponentially
375m Tablets by 2016 *
increased productivity with mobile apps45%
1 BillionSmartphonesby 2016 *
61%of CIOs put mobile as priority
Sources: IBM CIO study and Forrester Research (February 2012)*
© 2012 IBM Corporation3 @IBMMobile | #IBMatMobileCon
Becoming a mobile enterprise step by step
Develop mobile strategy,
policy and educate
employees
Secure mobile devices
Enable mobile network
infrastructure
Enable corporate email,
contact and calendar
Develop mobile
application strategy
Deploy and manage
mobile applications
1
2
3
4
5
6
© 2012 IBM Corporation4 @IBMMobile | #IBMatMobileCon
Develop mobile strategy, policy and educate employees
What business problem am I trying to solve with mobile?
Business to consumer and business to enterprise (B2C and B2E)
Is there a corporate policy that speaks to Bring Your Own Device? (BYOD) Do I need an
acceptable use policy? What’s the policy for mobile expense reimbursement and
arrangements with mobile carriers?
What are the corporate security and compliance requirements and how are they enforced?
What devices and OS levels are supported? How is support provided? Can I leverage
automation or self-service support to reduce costs? How do I educate employees?
11
© 2012 IBM Corporation5 @IBMMobile | #IBMatMobileCon
Secure mobile devices
End point and data management
Full disk encryption
End-to-end encryption
Containerization and separation between work and personal data
Remote wipe of corporate data should the device be lost, stolen or the employee leaves the
company
32
© 2012 IBM Corporation6 @IBMMobile | #IBMatMobileCon
Enable mobile network infrastructure
Securely connect smartphones and tablets to the corporate network to access enterprise
data
Wi-fi coverage at corporate locations for employees and guests
Network access control
Virtual Private Network (VPN) access when away from the office and accessing enterprise
data behind the corporate firewall
23
© 2012 IBM Corporation7 @IBMMobile | #IBMatMobileCon
Enable corporate e-mail, contact and calendar
Lotus Domino, Microsoft Exchange – on premise and cloud
Messaging middleware including Lotus Traveler, Exchange ActiveSync, BlackBerry
Enterprise Server, Good for Enterprise
Native e-mail and third party clients
Removing file attachments and changing file association type
44
© 2012 IBM Corporation8 @IBMMobile | #IBMatMobileCon
Develop mobile application strategy
Business to employee and business to consumer (B2E and B2C)
Collaboration, social media, sale tracking, document sharing
Network and security considerations
Buy vs. build
Native, web, hybrid and virtual applications
Software Development Kit (SDK) and Mobile Application Platform
55
© 2012 IBM Corporation9 @IBMMobile | #IBMatMobileCon
Deploy and manage mobile applications
Business to consumer and business to enterprise (B2C and B2E)
Distribute, update, manage, and secure mobile applications on both personal
and corporate-owned mobile devices
Application stores (public and enterprise)
Mobile application lifecycle management
Mobile application security & compliance management
666
© 2012 IBM Corporation10 @IBMMobile | #IBMatMobileCon1
0
IBM embraces Bring Your Own Device
425,000 employees worldwide
50% of employees work remotely
50% workforce has less than 5 years of service
Business outcomes:
Increased employee productivity
Increased employee satisfaction
Reduced security risk and loss of corporate data for personally owned devices
Over 120,000 employees using mobile devices for business with over 80,000 BYOD
3. Educate employees
4. Support personally owned devices through social software
1. Deploy a secure technology framework
2. Develop a strong usage policy
IBM's BYOD program "really
is about supporting
employees in the way they
want to work. They will find
the most appropriate tool to
get their job done. I want to
make sure I can enable them
to do that, but in a way that
safeguards the integrity of our
business.“
- IBM CIO Jeanette Horan
How did IBM address the challenge?
© 2012 IBM Corporation11 @IBMMobile | #IBMatMobileCon
IBM’s strategy addresses client mobile initiatives
Extend & TransformManage & SecureBuild & Connect
Key Capabilities
• Strategy, planning and
implementation
• Mobile-enabled solutions
including analytics,
commerce, and social
business
• Mobile as a service
Key Capabilities
• Mobile web, hybrid and
native app development
• Enterprise data, service,
and application integration
• Enterprise wireless
networking
Key Capabilities
• Mobile lifecycle
management
• Device analytics and
control
• Secure network
communications &
management
Build mobile
apps
Connect & run
mobile systems
Manage mobile devices and apps
Secure my mobile business
Extend capabilities to mobile
Transformyour business
© 2012 IBM Corporation12 @IBMMobile | #IBMatMobileCon
Engage With IBM This Week
1
2
3
Meet with an IBM expert to view a product
demo in booth 735
Learn more at ibm.com/mobile-enterprise and
follow us at #IBMMobile
Join the conversation at @ibmmobile and
#IBMatMobileCON
© 2012 IBM Corporation13 @IBMMobile | #IBMatMobileCon
Date Start Session Title Stage
Wed 11:00 AM IBM Mobile Enterprise Overview 3
11:00 AM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2
11:30 AM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2
11:30 AM Becoming a Mobile Enterprise Step-By-Step 3
1:00 PM Mobile Collaboration for Your Social Business 3
1:30 PM Making Commerce Mobile: Strategy and Trends of Mobile Commerce 3
2:00 PM Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence 2
2:30 PM Impact on IT of BYOD and the Mobile Enterprise 2
3:00 PM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2
3:30 PM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2
Thurs 11:00 AM IBM Mobile Enterprise Overview 3
11:00 AM Manage and Secure Your Mobile Enterprise: Delivering Visibility and Confidence 2
11:30 AM Impact on IT of BYOD and the Mobile Enterprise 2
11:30 AM Becoming a Mobile Enterprise Step-By-Step 3
1:00 PM Mobile Collaboration for Your Social Business 3
1:30 PM Making Commerce Mobile: Strategy and Trends of Mobile Commerce 3
2:00 PM Build and Connect Apps, Devices and Data: Take Your Enterprise Mobile 2
2:30 PM Syncing Mobile and Cloud Technologies to Drive Your Mobile-First Strategy 2
Join IBM during our other MobileCon sessions!
© 2012 IBM Corporation14 @IBMMobile | #IBMatMobileCon
© 2012 IBM Corporation15 @IBMMobile | #IBMatMobileCon
Legal Disclaimer
• © IBM Corporation 2011. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM
Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server).
Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your
presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in
your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International
Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other
countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of
others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
purposes only.