Beyond BYOD
-
Upload
agilly-mobility -
Category
Software
-
view
23 -
download
0
Transcript of Beyond BYOD
![Page 1: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/1.jpg)
© 2015 IBM Corporation
Jim Lundy – Aragon Chris Poulin – IBM July 23, 2015
Beyond BYOD: Securing IoT in the Enterprise for Employee Productivity
![Page 2: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/2.jpg)
2 © 2015 IBM Corporation
Introductions
Jim Lundy CEO and Lead Analyst
Aragon Research
Chris Poulin Research Strategist
IBM
![Page 3: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/3.jpg)
3 © 2015 IBM Corporation
Housekeeping items
Duration – 60 minutes Submit your questions to all
panelists in the Q&A box located in the bottom right corner of your screen
Recording and slides will be emailed to you
![Page 4: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/4.jpg)
The Future of Work is Digital
![Page 5: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/5.jpg)
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the
onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 5
![Page 6: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/6.jpg)
Computing is Shifting….to Mobile
Speech UI Predictive Apps Cognitive Apps
Mainframe PC Tablet Wearable/IOT
1964-1981 1981-2011 2011- 2015-
© 2015 Aragon Research Inc. All Rights Reserved. 6
Batch Processing
Desktop Apps Client/Server
Mobile Apps Digital Paper APIs
Paper Copying Faxing Email
Social Mobile Apps Cloud
Work Tools Digital Assistants Predictive Apps Drones/Robots
![Page 7: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/7.jpg)
The Major Trends Driving Innovation in Business
Strategic Assumptions Computers and Humans will work closer together than ever before.
Technology becomes a Competitive Weapon in Business.
![Page 8: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/8.jpg)
IOT is about Connecting Everything
1.3 Billion Devices 2.5 Million Apps
2014
2020 4 Billion Phones
30 Million Apps
700 Million Devices
400 Million Tablets
![Page 9: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/9.jpg)
The Impact of IOT on Work
9
Find Content via Voice Continue in Car
Worker Activity - iBeacon
On the Go
![Page 10: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/10.jpg)
Innovation and Market Disruption in a Digital Era
Taxi Uber Taxi App
App Economy
1894- 2012-
Electric Cars
Gas Powered Car Electric Car
2009- 1897-
![Page 11: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/11.jpg)
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change?
• What are the best practices to prepare for the onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 11
![Page 12: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/12.jpg)
Aragon Research Technology Arc for Mobile, 2015 – Collaboration is the driving force
Emerging Technologies being Adopted as Fast as Mature ones.
![Page 13: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/13.jpg)
The Shift from Mobile to IOT
EMM Expands to Wearables and IOT
Enterprise Mobile Management
PC / Server Management
More Devices and More Apps
![Page 14: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/14.jpg)
Wearables: Making Work and Life Simpler?
Hotel Check-in Airlines Dining Exercise
Content Email
Home Control
CRM
![Page 15: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/15.jpg)
IOT will cause an App Explosion
30 Million
4 Million
2015 2020
Homes
Cars
Buildings
Devices
Apps Everywhere Business Disruption Executives Need to Understand Mobile Enterprises need to war game scenarios
App Growth
![Page 16: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/16.jpg)
Security is Mission Critical
16 Enterprises need to invest more in Security Software.
Executives Are
Targets
Your IP is at Stake Your Executives are being targeted.
![Page 17: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/17.jpg)
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the
onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 17
![Page 18: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/18.jpg)
Enterprise Mobile Management is Strategic
Enterprise Mobile
Management
Mobile Device
Management
Mobile App Management
Mobile Content
Management
© 2014 Aragon Research Inc.
![Page 19: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/19.jpg)
Elements of an EMM Strategy
19
Policy for New Devices
Update Approach for IOT
Security for Apps
![Page 20: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/20.jpg)
Update your Mobile App Strategy
20
Apps that will benefit from Wearable Interface
Access a Service Easy to access a
Cloud app
Content Distribution News Training Content Books Movies, Music Games
Market the Business Location finder Brand awareness
Redefine the user or the Customer Experience - Leverage
Wearables - IOT As Business
Strategy
![Page 21: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/21.jpg)
Where to Start
1. Mobile Devices for Mobile Work
2. Prepare for Wearables
3. Understand IOT 4. Apps as a Business
Strategy
Mobile
Mobile App Jam
![Page 22: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/22.jpg)
Mobile and the Future of Software
Mobile First Apps are here
![Page 23: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/23.jpg)
IoT Era has arrived Develop a Strategy to Manage
Devices besides Phones EMM is a critical Success Factor Don’t wait to Deploy
Enterprises should adjust current
policies relative to New Devices and Apps
Summary
![Page 24: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/24.jpg)
24 © 2015 IBM Corporation
![Page 25: Beyond BYOD](https://reader034.fdocuments.in/reader034/viewer/2022042819/55cd64e0bb61eb45388b4784/html5/thumbnails/25.jpg)
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU www.ibm.com/security