Enterprise Apps: Boosting Secure Mobile Productivity
-
Author
ibm-maas360 -
Category
Mobile
-
view
336 -
download
1
Embed Size (px)
Transcript of Enterprise Apps: Boosting Secure Mobile Productivity
-
2015 IBM Corporation
Fliplet, Tata Communications and IBM
Ian Broom, Fliplet
Anupam Katkar, Tata Communications
Kaushik Srinivas, IBM
November 19, 2015
Enterprise Apps: Boosting Secure Mobile Productivity
-
2 2015 IBM Corporation
Housekeeping items
Duration 60 minutes
Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
Recording and slides will be
emailed to you
-
3 2015 IBM Corporation
Agenda
Mobile Application and Data Security Drivers for separation of work data on mobile devices
App containerization
SDK and App Wrapping
Fliplet Rapidly build apps
Enhance security with MaaS360
Customer success story - Tata Communications
Q&A
Mobile App
Lifecycle
Design
Develop
Secure
Deploy
Manage
-
2015 IBM Corporation
Mobile Application & Data Security Kaushik Srinivas, IBM
-
5 2015 IBM Corporation
Protect sensitive corporate data
Deploy public and enterprise apps
Provide access to work content
Top enterprise mobility initiatives
5
Embrace Bring Your Own Device (BYOD)
Migrate from BlackBerry to multi-OS
-
6 2015 IBM Corporation
Dual Persona to Separate Work and Personal
Secure Mail
Application Security
Secure Browser
Secure Document Sharing
6
WorkPlace Container for Mobile Collaboration
-
7 2015 IBM Corporation
Enterprises need ability to secure corporate data on any smartphone or tablet
First phase - Email, Calendar, Contacts and
Browser
The next stage of EMM evolution is securing other
work apps and providing easy access to back end
resources
Application Security SDK or wrapping can achieve
this for both in-house Enterprise apps and Public
apps
7
-
8 2015 IBM Corporation
Incorporate security right from the beginning
App Wrapping
Post-development
code injection
Software Dev. Kit (SDK)
Use libraries as part of
development
Authentication & Single Sign On
Data Loss Prevention (DLP) - Restrict copy-paste
- Open-in controls
Per-app VPN
Block usage on non-compliance
Data encryption
-
9 2015 IBM Corporation
The app wrapping process
Upload app to MaaS360 MAM portal
Wrap the app with
configurable security
layer
App available on Enterprise app store
App deployed to
user
User specific policy
applied to app on device
9
Application wrapping secures enterprise apps with a layer of corporate
policies, with zero coding by customer
*Per-app VPN requires MaaS360 Mobile Enterprise Gateway
-
10 2015 IBM Corporation
Deploy using the Enterprise App Store
Consolidated Management
interface independent of OS
Deploy and update apps without
delay
Integrate with existing
infrastructure (Ex: Active
Directory)
Control app security through
policies
Version control of apps
-
11 2015 IBM Corporation
Manage - App Discovery and Collaboration
Web-based App Catalog for
Mobile Apps
Discovery portal for all
platforms
User sharing and linking of
apps
User application review and
rating system
-
2015 IBM Corporation
App Security with Fliplet Ian Broom, Fliplet
-
www.Fliplet.com
How Fliplet helps companies
rapidly produce enterprise mobile
apps
-
www.Fliplet.com
How Maas360 helps Fliplet
customers secure their apps
-
www.Fliplet.com
Example apps built with Fliplet
internal communication/news
emergency management/disaster recovery
contact directory
sales support
training
events
reporting
-
www.Fliplet.com
How customers scale their use of
Fliplet
15 min training
No development or design skills
Decentralised app creation
Integrate other systems
Host in cloud, private cloud or on-premise
IT enforce compliance, standards and governance
-
www.Fliplet.com
The Insider App
Welcome screen Drop-down menu
-
2008 Tata Communications, Ltd. All Rights Reserved
Anupam Katkar, Tata Communications
MaaS360 and the Insider App
at Tata Communications
-
19 2015 IBM Corporation
Would you like more information?
Yes, please have Fliplet
Yes, please have MobileFirst Protect reach out
Yes, please have both Fliplet and MobileFirst Protect reach out
No, not at this time
Final Poll Placeholder
-
Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBMs sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU www.ibm.com/security
http://www.ibm.com/securityhttp://www.ibm.com/security