Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

31
© 2016 IBM Corporation Collaboration, Productivity and Endpoints Clint Adams IBM MaaS360 Offering Management Mobilizing Your Microsoft Investments

Transcript of Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

Page 1: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© 2016 IBM Corporation

Collaboration, Productivity and Endpoints

Clint AdamsIBM MaaS360 Offering Management

Mobilizing Your Microsoft Investments

Page 2: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

2© 2016 IBM Corporation

Housekeeping items

Duration – 30 minutesSubmit your questions to all

panelists in the Q&A boxRecording and slides will be

emailed to you

Page 3: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

3© 2016 IBM Corporation

Agenda

Securely mobilizing existing Microsoft applications and assets including Exchange, Office365, SharePoint and Active Directory

Mobilizing Windows 10 endpoints and the move to a unified management paradigm

Enterprise Mobility Management for Windows 10 and leveraging MaaS360 for seamless deployments

Page 4: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© 2016 IBM Corporation

Securely Mobilizing Your Microsoft ApplicationsExchange, Office 365, SharePoint and Active Directory

Page 5: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

5© 2016 IBM Corporation

Robust Mobile Security is the Foundation

Device

Applications

Network

Email

Documents

Auto-quarantine/access approvalContain emails & attachments

Remote wipe of work email

Password authenticationRestrict copy, paste, shareRemote wipe of work files

Configure Wi-Fi & VPN profilesCert delivery & authentication

Dynamic policy based on SSID

Encryption & passcodesJailbreak/Root/Attestation,

Locate, lock, wipe

Blacklist/Whitelist mobile appsWrapping & compliance rules

Remote wipe of managed apps

Web

Define URL filters & categoriesAllow access to intranet sites

Disable native/3rd party browsers

Page 6: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

6© 2016 IBM Corporation

Contain and Separate Exchange Email with Secure Mail

Contains emails & attachments to prevent data leakage

FIPS 140-2 compliant, AES-256 bit encryption for data at rest

Enforce authentication, cut & paste restrictions & view-only mode

Restrict forwarding, moving & screen captures

Conduct on-line & off-line compliance checks prior accessing email

An intuitive personal information management (PIM) app with email, calendar & contacts for iOS, Android & Windows Phone

Page 7: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

7© 2016 IBM Corporation

Securely Deliver Content and Integrate with SharePoint/OneDrive

Contain content files to prevent data leakage Doc Catalog App for iOS & Android Centralized distributed content & repositories

such as SharePoint, Windows File Shares, Box, Google Drive, OneDrive, IBM Connections & other CMIS systems

User-based authentication for access Alert users on new or updated content Cut/paste restrictions & view only mode Versioning & time-based expirations Content Cloud for hosting & distribution

A mobile document container for secure content collaboration

Page 8: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

8© 2016 IBM Corporation

IBM MaaS360 Gateway for Documents

Access document files & folders using IBM MaaS360 Content Create, edit, save & share documents securely No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls

Seamless & secure access to internal SharePoint sites, Windows File Shares & other enterprise file stores on a mobile device

Page 9: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

9© 2016 IBM Corporation

Office Document Editor

Work on documents anywhere in an encrypted container for iOS & Android

Collaborate on Word, Excel, PowerPoint & text files

Change fonts, font size & color

Insert images, camera photos, links, shapes, tables & more

Perform searches within documents

Share seamlessly with IBM MaaS360 Secure Mail & to corporate file folders

An office productivity app to create, edit & save documents on mobile devices

Page 10: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

10© 2016 IBM Corporation

Enterprise Integration

Page 11: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© 2016 IBM Corporation

Mobilizing Windows 10The move to a unified management paradigm

Page 12: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

12© 2016 IBM Corporation

Windows 10 is Here

Windows 10 generally available on July 29, 2015 “Free” upgrades to majority of devices except for Enterprise users First 24 hours – 14 million installs

– At peak - Windows 10 was being installed on about 1500 machines per second Adoption is accelerating: >40% of new Win10 devices since Black Friday Microsoft expects 1 billion devices to be running Windows 10 in 3 years

Page 13: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

13© 2016 IBM Corporation

IBM MaaS360 Windows 10 Webinar Poll Results

Page 14: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

14© 2016 IBM Corporation

Microsoft has an API set across Windows 10 PC/Tablet and Mobile API set is an extension to Windows Phone 8.1 No API sets on Windows 7 Mac OS X provides a set of management APIs similar to iOS. Apple is working on convergence of management API sets

A Framework for Convergence

Page 15: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

15© 2016 IBM Corporation

Windows 10 MDM Grows Up

BYOD: simple security settings

Device Lockdown

Fully managed corporate device

Phone Desktop Phone Desktop

Significant investments in added functionality for both mobile and desktop devices

Page 16: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

16© 2016 IBM Corporation

Convergence, Where Are We?

Page 17: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© 2016 IBM Corporation

Enterprise Mobility Management for Windows 10Leveraging MaaS360 EMM for Seamless Deployments

Page 18: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

18© 2016 IBM Corporation

Windows 10 MDM

One consistent set of MDM capabilities

across Mobile, Desktop

• Provisioning• Bulk enrollment

• Extended set of policiesClient certificate management

• Enterprise Wi-Fi• VPN management• Email provisioning• MDM Push• Configure trusted Certificates• Device Update control• Kiosk, Start screen, Start menu

configuration and control

• Curated Windows Store• Business Store Portal (BSP) app

deployment; license reclaim• Enterprise App management• App allow/deny lists via Applocker• Enterprise data protection

• Full device wipe • Remote Lock, PIN reset, Ring,

& Find• Enhanced inventory for compliance

decisions

• Unenrollment with alerts• Removal of Enterprise configuration

(apps, certs, profiles, policies) and Enterprise encrypted data (with EDP)

• Additional device inventory

Page 19: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

19© 2016 IBM Corporation

Security Policies, Network and Device Restrictions

Page 20: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

20© 2016 IBM Corporation

Configure ActiveSync Settings

Page 21: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

21© 2016 IBM Corporation

Windows 10 Actions

Page 22: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

22© 2016 IBM Corporation

Windows 10 Enterprise Data Protection

Encrypt enterprise data on employee- and corporate-owned devices Remotely wipe enterprise data off managed devices w/o affecting personal data Privileged Apps

– Select specific apps that can access data– Block non-privileged apps from accessing data

Employees not interrupted while switching between personal and enterprise apps while security policies are in place.

https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx

Page 23: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

23© 2016 IBM Corporation

Universal Applications, Store and Software Distribution

Build once – install on all devices Multiple types of applications

– Win32 – “legacy” type of application – APPX, App-V

Business Store for Applications– Acquire and Distribute Applications– Bulk Acquisition of Apps (Free and Paid)– Application Management – reclaim/re-use licenses

Page 24: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© 2016 IBM Corporation

MaaS360 Enterprise Mobility ManagementThe Right Tool for Mobilizing Microsoft and Windows 10

Page 25: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

25© 2016 IBM Corporation

Complete mobility management and security

Page 26: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

26© 2016 IBM Corporation

Platform for strong mobile security

Page 27: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

27© 2016 IBM Corporation

Why IBM MaaS360?

Integratedsolutions that connect

seamlessly to your existing and external environments

Scalabledata security with intelligence for the

volume, speed, and variability of mobile

Completemanagement of

devices, apps, content and users from a single platform

Page 28: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

28© 2016 IBM Corporation

Get started right now

InstantAccess a free, fully functional trial for 30 days

MobileManage and secure your devices, apps and content

EasySet up and configure your service in minutes

1 2 3

Page 29: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

29© 2016 IBM Corporation

Notices and Disclaimers

29

Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.

Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.

Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.

References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Page 30: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

30© 2016 IBM Corporation

Notices and Disclaimers Con’t.

30

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.

IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.

Page 31: Mobilizing Your Microsoft Investments: Collaboration, Productivity and Endpoints

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOUwww.ibm.com/security