SlideShare a Scribd company logo
© 2013 IBM Corporation
Securing the Mobile Enterprise
Jude Lancaster
Product Manager
Endpoint Manager for Mobile Devices
1
1
IBM Endpoint Manager Mobile Device management
2
IBM Endpoint Manager Architecture
TEM Server
DB
Console / Web Reports
Relay(s)
Android devices* Apple iOS devices*
Apple Push
Notification
Servers
http / 52311
http / 52311
Management
Extender
Servers, desktops, laptops*
Relay
http / 52311
TCP port 2195 to
gateway.push.apple.com
TCP port 5223 to
*.push.apple.com
* Managing devices that are not connected to the internal network requires opening the management port to the
Internet (HTTP 52311 for Laptops and Android or HTTPS 443 for Apple iOS devices)
BigFix Server
Blackberry*
BES
https / 443
3
3
• Securely enable and accelerate
BYOD mobility
• Mobilize every employee with secure
connectivity to apps and services
• Scale without limits, without
infrastructure costs
Next generation mobility
Mobile meets Cloud
Company
4
DIVIDE OVERVIEW
Company
Dual Persona
• Native user experience
• Secure work container
for iOS & Android
• Extensible to VPN & UC
Business Applications
• Common apps for all
employees
• Third-party apps by
employee group
• External file storage option
Cloud Management
• IT control of the container
• User self-service
• MDM APIs
4
5
5
Ibm endpoint manager + divide
Complete MDM BYOD Solution
Dual Persona
Leverages the sophisticated policies and
features of IBM MDM and Endpoint
Management
Management of Divide as a “virtual device”
including safe, secure distribution and
management of apps
+ +
Immediate solution for BYOD challenges
and security concerns for Mobility OS’s
Seamless delivery: same Divide App,
binding to IBM MDM at time of enrollment
Business AppsIBM Endpoint Manager
6
Architected for reliability
6
No Enterprise Data traverses the Divide Cloud
Management
Traffic
Control
Data
Customer Email Server
What is stored in the Divide cloud?
Device Inventory
Email addresses
Policy settings
DIVIDE MANAGER
Customer Site
DIVIDE
Smart Devices
IBM Endpoint Manager
Company
7
DUAL PERSONA IS FOUNDATIONAL
Separate and Secure Dual Personas
• Data security
• Enterprise apps and services
• Easy to manage and control
• Native user experience
• Choice of device, services
• Freedom and privacy
7
8
“ Lorem ipsum
dolor sit amet,
consectetuer
adipiscing elit.
Integer
pharetra, felis id
volutpatadipisci
ng quam lectus
8
2 U.K.-based
analyst firm Gfk
“When asked why users
are loyal to their
smartphones, 72%
cited ease of use and
the ability to quickly
navigate their phone's
menu.”2
What users want
Choice of native user experience
PERSONAL WORKSPACEENTER
PASSCODE
Tap Divide app icon
Double tap Home button
to access Divide
9
9
• Professional-grade email, contacts, calendar and browser
• Data-at-rest is protected with AES 256 bit
encryption
• Data-in-motion leverages existing VPN
investments
• Secure cloud based file storage (optional)
• Separate voice and messaging
(including future 2-number UC)
• Internally developed apps uploaded and
assigned via policy – in minutes and with
no developer modifications
• Divide App security automatically
provides data-at-rest AES-256 bit
encryption
• Divide Extensions provide extraordinary
integration with 3rd party Apps and Cloud services
GEARED FOR INNOVATION
Leveraging the App Ecosystem
STANDARD DIVIDE APPS THIRD PARTY APPS
10
10
What it organizations need for byod
Divide Container Security
Data Protection
• Device PIN/passcode
• Passcode history and complexity
• Passcode failure actions
• FIPS 140-2 validated encryption
• Full and selective device wipe
• Wipe on SIM removal/rooted
• VPN support
• S/MIME support
OTA Self-Service Provisioning
• ActiveSync email
• VPN configuration
Container Controls
• Whitelisting – application push
• Blacklisting
• Location based services
• Data leakage prevention
• URL blocking
Compliance Management and Reporting
• Device hardware
• Operating system
• Policy compliance
• Compromised device status
• Voice, Data, and SMS usage reporting
11
Extensible for the future
11Company
12
Securing next generation mobility
IBM Endpoint Manager with Divide delivers a comprehensive platform for mobility
12
Unified tracking and
management of
everything a mobile
user needs including
employee owned
devices and
corporate provided
smartphones,
tablets and laptops
A “single pane-of-
glass” to provision
and manage mobile
devices, laptops and
the Divide
workspace in the
easiest way
possible.
Directly connects
the Divide
workspace with IT
apps and services
via the corporate
VPN for complete IT
control.
The Divide
workspace provides
a native user
experience that
users expect and
love and is
extensible to IT
voice and data
services.
Security &
Compliance
Inventory
Tracking
Device
Management
Secure & Reliable
Access Management
User
Experience
A fully integrated
next generation
solution for
mobility that
delivers simplicity
and scale
Limited to mobile
devices with
separate facilities to
track corporate and
employee owned
devices with manual
consolidation of data
A “swivel-chair”
approach with
separate consoles to
manage mobile
devices and the
Good email sandbox
breeds operational
complexity and
requires additional
admin training.
No VPN integration
for personal devices
with all data
traversing the Good
NOC and on-
premise servers,
creating issues of
reliability and scale.
The Good sandbox
delivers a
proprietary “one size
fits all’ user
experience that
users reject and is
email-centric.
An inherently
siloed
approach to
mobility that
inflates costs
and complexity
A single policy
management and
compliance platform
eliminates security
gaps and simplifies
policy administration
and enforcement
Separate facilities
for policy
management and
compliance creates
operational
overhead and error
opportunities
13
The right solution for byod?
13
A first
generation
solution
purpose-built
for email sync
A next
generation
solution
purpose-built
for BYOD
Device
Management
X
✔Manages the
Divide
workspace
and integrates
with IBM
Endpoint
Manager for
device MDM
Does not
integrate with
deployed
MDM
solutions
Secure
“Workspace”
✔
X
Provides a
secure
workspace
that preserves
the native iOS
and Android
user
experience
Provides an
email sandbox
with a
proprietary
user interface
Secure
VPN
✔
X
Provides VPN
connectivity
between the
workspace
and corporate
apps
No VPN
integration -
all data
traverses the
Good NOC
App
Choice
✔
X
App wrapper
technology
enables the
use of any
third party
app within the
workspace
Third-party
apps must be
modified and
recompiled
using the
Good SDK ($)
Avg TCO/
User
$$$$
$$$$
$
14
Questions

More Related Content

PDF
Securing the Mobile Enterprise
PPTX
Norton Zone File-Sharing Service
PDF
Symantec Enterprise Mobility Vision May 2012
PPTX
MDM - airwatch
PPTX
Covert asae tech 13 mdm implementation
PPTX
Enterprise Mobility Suite- Introduction
PPTX
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
PPTX
Microsoft Enterprise Mobility Suite | Getting started....
Securing the Mobile Enterprise
Norton Zone File-Sharing Service
Symantec Enterprise Mobility Vision May 2012
MDM - airwatch
Covert asae tech 13 mdm implementation
Enterprise Mobility Suite- Introduction
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Microsoft Enterprise Mobility Suite | Getting started....

What's hot (20)

PPTX
Samsung KNOX - The Most Secure Android Solution
PPTX
Windows intune
PPTX
Enterprise Mobility Suite-Microsoft Intune
PPTX
Enterprise Mobility Suite- Azure AD Premium
PDF
BlackBerry Mobile Fusion
PDF
Cortado Corporate Server 7.2 - EN
PPTX
PDF
Authentication Management
PDF
CIS14: Mobilize Your Workforce with Secure Identity Services
PDF
VMware Workspace One
PPSX
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
PPTX
KNOX Message: Collaborate Securely, Anywhere, Anytime
PDF
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
PDF
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
PDF
Knox Configure Sales Deck
PPTX
Knox Manage
PDF
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
PDF
Microsoft Enterprise Mobility Suite Presented by Atidan
PPTX
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
PPTX
Ubiquitous information capture
Samsung KNOX - The Most Secure Android Solution
Windows intune
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite- Azure AD Premium
BlackBerry Mobile Fusion
Cortado Corporate Server 7.2 - EN
Authentication Management
CIS14: Mobilize Your Workforce with Secure Identity Services
VMware Workspace One
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
KNOX Message: Collaborate Securely, Anywhere, Anytime
IT/Dev Connections: Intune, ConfigMgr, or Both: Choose the Right Tool for the...
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Knox Configure Sales Deck
Knox Manage
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Ubiquitous information capture
Ad

Viewers also liked (9)

PPTX
La información ( Gestion Del Conocimiento )
PPT
курить или не курить
PDF
Evergreen nucleo final
PPTX
Crear una estrategia de Marketing en las Redes Sociales paso a paso
PPT
The horse meat scandal -merican media presented the situation
PPTX
Culturas de ica
PDF
Ailesbury Clinic Dublin
PDF
Lenda da Batalha de Ourique
PPTX
WEB SOCIAL
La información ( Gestion Del Conocimiento )
курить или не курить
Evergreen nucleo final
Crear una estrategia de Marketing en las Redes Sociales paso a paso
The horse meat scandal -merican media presented the situation
Culturas de ica
Ailesbury Clinic Dublin
Lenda da Batalha de Ourique
WEB SOCIAL
Ad

Similar to Securing the Mobile enterprise (20)

PDF
Unified Device Management
PPTX
IBM Endpoint Manager for Mobile Devices (Overview)
PPT
IBM Partner Jam - 10th April 2013
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PPTX
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
PDF
Pulse 2014.mobile first.security
PDF
MobileFirst
PDF
Smarter Commerce Summit - IBM MobileFirst Services
PDF
Reference Security Architecture for Mobility- Insurance
PDF
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
PDF
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
PDF
WSO2 Enterprise Mobility Manager - 2.0
PPT
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PPT
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
PPTX
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
PPT
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
PPTX
Mobile Security for the Enterprise
PDF
Android vs i os features
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
Unified Device Management
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Partner Jam - 10th April 2013
Best practices for mobile enterprise security and the importance of endpoint ...
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Pulse 2014.mobile first.security
MobileFirst
Smarter Commerce Summit - IBM MobileFirst Services
Reference Security Architecture for Mobility- Insurance
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
WSO2 Enterprise Mobility Manager - 2.0
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Mobile Security for the Enterprise
Android vs i os features
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...

More from IBM Danmark (20)

PPTX
DevOps, Development and Operations, Tina McGinley
PPTX
Velkomst, Universitetssporet 2013, Pia Rønhøj
PPTX
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
PPT
Mobile, Philip Nyborg
PPTX
IT innovation, Kim Escherich
PPTX
Echo.IT, Stefan K. Madsen
PPT
Big Data & Analytics, Peter Jönsson
PPTX
Social Business, Alice Bayer
PDF
Numascale Product IBM
PDF
Mellanox IBM
PDF
Intel HPC Update
PDF
IBM general parallel file system - introduction
PDF
NeXtScale HPC seminar
PDF
Future of Power: PowerLinux - Jan Kristian Nielsen
PDF
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
PDF
Future of Power: Big Data - Søren Ravn
PDF
Future of Power: IBM PureFlex - Kim Mortensen
PDF
Future of Power: IBM Trends & Directions - Erik Rex
PDF
Future of Power: Håndtering af nye teknologier - Kim Escherich
PDF
Future of Power - Lars Mikkelgaard-Jensen
DevOps, Development and Operations, Tina McGinley
Velkomst, Universitetssporet 2013, Pia Rønhøj
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Mobile, Philip Nyborg
IT innovation, Kim Escherich
Echo.IT, Stefan K. Madsen
Big Data & Analytics, Peter Jönsson
Social Business, Alice Bayer
Numascale Product IBM
Mellanox IBM
Intel HPC Update
IBM general parallel file system - introduction
NeXtScale HPC seminar
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Big Data - Søren Ravn
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power - Lars Mikkelgaard-Jensen

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Chapter 5: Probability Theory and Statistics
PDF
STKI Israel Market Study 2025 version august
PDF
Hybrid model detection and classification of lung cancer
PPTX
1. Introduction to Computer Programming.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Modernising the Digital Integration Hub
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
A comparative study of natural language inference in Swahili using monolingua...
Hindi spoken digit analysis for native and non-native speakers
Programs and apps: productivity, graphics, security and other tools
Chapter 5: Probability Theory and Statistics
STKI Israel Market Study 2025 version august
Hybrid model detection and classification of lung cancer
1. Introduction to Computer Programming.pptx
What is a Computer? Input Devices /output devices
Developing a website for English-speaking practice to English as a foreign la...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting started with AI Agents and Multi-Agent Systems
Modernising the Digital Integration Hub
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Module 1.ppt Iot fundamentals and Architecture
Enhancing emotion recognition model for a student engagement use case through...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
OMC Textile Division Presentation 2021.pptx
observCloud-Native Containerability and monitoring.pptx

Securing the Mobile enterprise

  • 1. © 2013 IBM Corporation Securing the Mobile Enterprise Jude Lancaster Product Manager Endpoint Manager for Mobile Devices
  • 2. 1 1 IBM Endpoint Manager Mobile Device management
  • 3. 2 IBM Endpoint Manager Architecture TEM Server DB Console / Web Reports Relay(s) Android devices* Apple iOS devices* Apple Push Notification Servers http / 52311 http / 52311 Management Extender Servers, desktops, laptops* Relay http / 52311 TCP port 2195 to gateway.push.apple.com TCP port 5223 to *.push.apple.com * Managing devices that are not connected to the internal network requires opening the management port to the Internet (HTTP 52311 for Laptops and Android or HTTPS 443 for Apple iOS devices) BigFix Server Blackberry* BES https / 443
  • 4. 3 3 • Securely enable and accelerate BYOD mobility • Mobilize every employee with secure connectivity to apps and services • Scale without limits, without infrastructure costs Next generation mobility Mobile meets Cloud Company
  • 5. 4 DIVIDE OVERVIEW Company Dual Persona • Native user experience • Secure work container for iOS & Android • Extensible to VPN & UC Business Applications • Common apps for all employees • Third-party apps by employee group • External file storage option Cloud Management • IT control of the container • User self-service • MDM APIs 4
  • 6. 5 5 Ibm endpoint manager + divide Complete MDM BYOD Solution Dual Persona Leverages the sophisticated policies and features of IBM MDM and Endpoint Management Management of Divide as a “virtual device” including safe, secure distribution and management of apps + + Immediate solution for BYOD challenges and security concerns for Mobility OS’s Seamless delivery: same Divide App, binding to IBM MDM at time of enrollment Business AppsIBM Endpoint Manager
  • 7. 6 Architected for reliability 6 No Enterprise Data traverses the Divide Cloud Management Traffic Control Data Customer Email Server What is stored in the Divide cloud? Device Inventory Email addresses Policy settings DIVIDE MANAGER Customer Site DIVIDE Smart Devices IBM Endpoint Manager Company
  • 8. 7 DUAL PERSONA IS FOUNDATIONAL Separate and Secure Dual Personas • Data security • Enterprise apps and services • Easy to manage and control • Native user experience • Choice of device, services • Freedom and privacy 7
  • 9. 8 “ Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Integer pharetra, felis id volutpatadipisci ng quam lectus 8 2 U.K.-based analyst firm Gfk “When asked why users are loyal to their smartphones, 72% cited ease of use and the ability to quickly navigate their phone's menu.”2 What users want Choice of native user experience PERSONAL WORKSPACEENTER PASSCODE Tap Divide app icon Double tap Home button to access Divide
  • 10. 9 9 • Professional-grade email, contacts, calendar and browser • Data-at-rest is protected with AES 256 bit encryption • Data-in-motion leverages existing VPN investments • Secure cloud based file storage (optional) • Separate voice and messaging (including future 2-number UC) • Internally developed apps uploaded and assigned via policy – in minutes and with no developer modifications • Divide App security automatically provides data-at-rest AES-256 bit encryption • Divide Extensions provide extraordinary integration with 3rd party Apps and Cloud services GEARED FOR INNOVATION Leveraging the App Ecosystem STANDARD DIVIDE APPS THIRD PARTY APPS
  • 11. 10 10 What it organizations need for byod Divide Container Security Data Protection • Device PIN/passcode • Passcode history and complexity • Passcode failure actions • FIPS 140-2 validated encryption • Full and selective device wipe • Wipe on SIM removal/rooted • VPN support • S/MIME support OTA Self-Service Provisioning • ActiveSync email • VPN configuration Container Controls • Whitelisting – application push • Blacklisting • Location based services • Data leakage prevention • URL blocking Compliance Management and Reporting • Device hardware • Operating system • Policy compliance • Compromised device status • Voice, Data, and SMS usage reporting
  • 12. 11 Extensible for the future 11Company
  • 13. 12 Securing next generation mobility IBM Endpoint Manager with Divide delivers a comprehensive platform for mobility 12 Unified tracking and management of everything a mobile user needs including employee owned devices and corporate provided smartphones, tablets and laptops A “single pane-of- glass” to provision and manage mobile devices, laptops and the Divide workspace in the easiest way possible. Directly connects the Divide workspace with IT apps and services via the corporate VPN for complete IT control. The Divide workspace provides a native user experience that users expect and love and is extensible to IT voice and data services. Security & Compliance Inventory Tracking Device Management Secure & Reliable Access Management User Experience A fully integrated next generation solution for mobility that delivers simplicity and scale Limited to mobile devices with separate facilities to track corporate and employee owned devices with manual consolidation of data A “swivel-chair” approach with separate consoles to manage mobile devices and the Good email sandbox breeds operational complexity and requires additional admin training. No VPN integration for personal devices with all data traversing the Good NOC and on- premise servers, creating issues of reliability and scale. The Good sandbox delivers a proprietary “one size fits all’ user experience that users reject and is email-centric. An inherently siloed approach to mobility that inflates costs and complexity A single policy management and compliance platform eliminates security gaps and simplifies policy administration and enforcement Separate facilities for policy management and compliance creates operational overhead and error opportunities
  • 14. 13 The right solution for byod? 13 A first generation solution purpose-built for email sync A next generation solution purpose-built for BYOD Device Management X ✔Manages the Divide workspace and integrates with IBM Endpoint Manager for device MDM Does not integrate with deployed MDM solutions Secure “Workspace” ✔ X Provides a secure workspace that preserves the native iOS and Android user experience Provides an email sandbox with a proprietary user interface Secure VPN ✔ X Provides VPN connectivity between the workspace and corporate apps No VPN integration - all data traverses the Good NOC App Choice ✔ X App wrapper technology enables the use of any third party app within the workspace Third-party apps must be modified and recompiled using the Good SDK ($) Avg TCO/ User $$$$ $$$$ $