Embracing Android Nougat for Speed, Strength and Security

19
Embracing Android Nougat for Speed, Strength and Security October 6, 2016 MaaS360 Product Management Frank Schloendorn, Imtiazuddin A. Bellary

Transcript of Embracing Android Nougat for Speed, Strength and Security

Embracing Android Nougat for Speed, Strength and Security

October 6, 2016

MaaS360 Product Management

Frank Schloendorn, Imtiazuddin A. Bellary

2 IBM Security 2 © 2016 IBM Corporation

Housekeeping items

Duration – 60 minutes

Submit your questions to the Q&A box located on the

left-hand side of your screen

Recording and slides will be emailed to you

3 IBM Security 3 © 2016 IBM Corporation

Agenda

• Android Nougat at a Glance Key Features

Improved Performance

Enhanced Security

• Enterprise Features - Android for Work

• Leveraging Android Nougat with IBM MaaS360

4 IBM Security 4 © 2016 IBM Corporation

Android N – At a Glance

• Released on August 22nd 2016, Android N upgrade available for

Nexus 6P, 5X, 9

HTC 10, One A9, One M9

Samsung Galaxy S7, S7 Edge, S6, S6 Edge, Note 5, Note 7

LG G5, V20 (New)

Few models of Sony, Motorola and others

• New Features include

Multi Window support (2 Apps side-by-side and easy switching)

Better & Secure Android for Work

Smarter battery (Doze on the Go)

Bundled Notifications & Direct reply on notification

Data Saver & Notification controls

File base encryption (and seamless security updates)

JIT Complier, VR mode & Vulkan API (High performance graphics) for improved performance

• IBM MaaS360 released same-day support for Android Nougat devices

5 IBM Security 5 © 2016 IBM Corporation

Android N – Key Features – Productivity & Usability

• Multi Window View (Split Screen) Available in both portrait and landscape

Activated by long-pressing the app overview/recent apps

button or by long-pressing an app preview card

• Quick Switch between apps Shuffle between the two most recently used apps

• Customize Quick Settings Handy list of five toggles at the top of your notifications shade

Edit the order to prioritize the important ones

Multiple pages of tiles

• Notification Direct Reply Quick reply to a message directly from the notification

IBM CONFIDENTIAL

6 IBM Security 6 © 2016 IBM Corporation

Android N – Key Features – Productivity & Usability

• Bundled Notifications Multiple notifications from the same app to be bundled

• Notification Controls

Manage notification information to

• Show notifications silently

• Block all notifications

• Don’t silence or block

• Multi locale language support Set primary and secondary language

• 72 New Emojis

IBM CONFIDENTIAL

7 IBM Security 7 © 2016 IBM Corporation

Android N – Key Features - Performance

• Battery saver (Doze on the Go) Works not only when the device is stationary for a while

but also when it is in motion

Shuts down network access and only periodically sync

data and run tasks

• Data Saver mode Denies internet access to background apps when you're

connected to cellular data

Accessible both as a Quick Settings toggle or via the

Data area in Settings

IBM CONFIDENTIAL

8 IBM Security 8 © 2016 IBM Corporation

Android N – Key Features - Performance

• New JIT compiler Android system will pre-compile some apps but only

compile parts of other apps when they are actually

required

Faster booting phone, apps that use less RAM, require

less storage and get updated faster

• VR mode for high performance virtual reality

• Vulkan API (high performance 3D graphics) Faster, smoother and better rendered gaming graphics

IBM CONFIDENTIAL

9 IBM Security 9 © 2016 IBM Corporation

Android N – Key Features - Security

• Direct boot (faster, secure boot)

• Seamless Software updates Android updates will be downloaded in the background and

stored on a different system partition

On restart of the phone, the system will switch partitions and

you’ll instantly have the new Android updates

• File-based encryption Android 7.0 moves to a file encryption basis from full disk

encryption in Marshmallow

• Scoped folder access Allows app developers to specifically request access to

individual folders rather than all of your folders

• Trusted Face (Face recognizer)

IBM CONFIDENTIAL

Android for Work ENTERPRISE FEATURES

IBM CONFIDENTIAL

11 IBM Security 11 © 2016 IBM Corporation

Android N – Android for Work

Customized & Faster Provisioning

QR Code Provisioning for DO mode

• Provision devices using QR code

• Ease of creation of QR code

• Wifi setup on the device via QR code

Customize color and enterprise logo

• Set up custom color and enterprise logo during profile

creation

Provision customers via Android for Work

Accounts Enterprise

• Let EMM vendors create and manage Google set up

and user accounts

• Effortless Administration via EMM portal

12 IBM Security 12 © 2016 IBM Corporation

Android N – Android for Work

Increased Security

Passcode challenge for work apps

• Mandate passcode challenge on navigation to work apps on a PO device

(BYOD)

• Enhanced security for corporate data

Always on VPN support

• Mandate Always on VPN for a device

Disable access to apps

• Blacklist apps on the device

Disable data roaming

• To save on network data usage

Lockdown wallpaper

Lockdown User Icon

Toggle Work Mode

• Control Work mode on PO devices

13 IBM Security 13 © 2016 IBM Corporation

Android N – Android for Work

Enhanced Productivity

Remote Reboot

• Reboot devices remotely

Process Logging

• Enable process logging to capture user actions on the

device

Remotely trigger bug reports

• Trigger bug reports to debug device irregularities

Device health monitoring

• Capture device health regularly

Multiple CA certificates per SSID

• Allow ease of Wifi and VPN configuration across

geographies

Personal and Work Contacts Integration

• Allow work contacts to be accessible in personal dialer

Leveraging Android N with IBM MaaS360

IBM CONFIDENTIAL

15 IBM Security 15 © 2016 IBM Corporation

IBM CONFIDENTIAL

Broadening productivity with Android for Work

With MaaS360, Android for Work and Samsung Knox, you can get Android devices more productive

& more secure for end users

Secure Content | Native User Experience • Easy management & enhanced security

• Prepackaged with work apps and collaboration tools

• Helps employees to work smarter and faster

Android for Work Settings in Android N • Greater Security with more certificate integrations, Always

ON VPN, Work Profile Security Challenges

• Enhanced remote support with remote reboot & bug

reports, disabling of data roaming, removing client

certificates

• Customized Provisioning, Lock screen messages & more

Expanding Support Matrix • Instant Android N Support

• Continued support for upcoming Knox

2.7 and Knox 2.8 releases

• More OEM APIs including support for

mainstream & rugged devices

Easier Provisioning • Bulk Enrollment & Easier Knox enrollment for Android N

• Enhanced usability for Kiosk mode

16 IBM Security 16 © 2016 IBM Corporation

IBM CONFIDENTIAL

Delivering Solutions with Android Kiosk mode

With MaaS360, Android for Work, Samsung Knox and Standard Android you can get Android

devices to deliver required functionality securely on Kiosk mode

Easier Provisioning & Increased Support • Easy deployment via policies

• Support for Android for Work (COSU), Samsung Knox and Standard Android

• Customizable to various available modes

• Whitelist required apps

• Control Kiosk Launcher settings on the device

• Silent install of app upgrades

• Manage access to device controls

Usability Enhancements • Widgets support

• Customized Wi-Fi and Bluetooth settings

• Ordering of apps on launcher screen

• Auto rendering of app as per screen orientation on rotation

Android Kiosk mode

Extensive Support

Q&A ANDROID NOUGAT

IBM CONFIDENTIAL

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express

or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,

creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these

materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may

change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and

other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks

or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.

Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or

product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are

designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.

IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT

OF ANY PARTY.

FOLLOW US ON:

THANK YOU

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.

Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml

Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.

Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Legal notices and disclaimers

IBM CONFIDENTIAL