mobilizing your microsoft investments: collaboration, productivity and endpoints
TRANSCRIPT
© 2016 IBM Corporation
Collaboration, Productivity and Endpoints
Clint AdamsIBM MaaS360 Offering Management
Mobilizing Your Microsoft Investments
2© 2016 IBM Corporation
Housekeeping items
Duration – 30 minutesSubmit your questions to all
panelists in the Q&A boxRecording and slides will be
emailed to you
3© 2016 IBM Corporation
Agenda
Securely mobilizing existing Microsoft applications and assets including Exchange, Office365, SharePoint and Active Directory
Mobilizing Windows 10 endpoints and the move to a unified management paradigm
Enterprise Mobility Management for Windows 10 and leveraging MaaS360 for seamless deployments
© 2016 IBM Corporation
Securely Mobilizing Your Microsoft ApplicationsExchange, Office 365, SharePoint and Active Directory
5© 2016 IBM Corporation
Robust Mobile Security is the Foundation
Device
Applications
Network
Documents
Auto-quarantine/access approvalContain emails & attachments
Remote wipe of work email
Password authenticationRestrict copy, paste, shareRemote wipe of work files
Configure Wi-Fi & VPN profilesCert delivery & authentication
Dynamic policy based on SSID
Encryption & passcodesJailbreak/Root/Attestation,
Locate, lock, wipe
Blacklist/Whitelist mobile appsWrapping & compliance rules
Remote wipe of managed apps
Web
Define URL filters & categoriesAllow access to intranet sites
Disable native/3rd party browsers
6© 2016 IBM Corporation
Contain and Separate Exchange Email with Secure Mail
Contains emails & attachments to prevent data leakage
FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Enforce authentication, cut & paste restrictions & view-only mode
Restrict forwarding, moving & screen captures
Conduct on-line & off-line compliance checks prior accessing email
An intuitive personal information management (PIM) app with email, calendar & contacts for iOS, Android & Windows Phone
7© 2016 IBM Corporation
Securely Deliver Content and Integrate with SharePoint/OneDrive
Contain content files to prevent data leakage Doc Catalog App for iOS & Android Centralized distributed content & repositories
such as SharePoint, Windows File Shares, Box, Google Drive, OneDrive, IBM Connections & other CMIS systems
User-based authentication for access Alert users on new or updated content Cut/paste restrictions & view only mode Versioning & time-based expirations Content Cloud for hosting & distribution
A mobile document container for secure content collaboration
8© 2016 IBM Corporation
IBM MaaS360 Gateway for Documents
Access document files & folders using IBM MaaS360 Content Create, edit, save & share documents securely No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls
Seamless & secure access to internal SharePoint sites, Windows File Shares & other enterprise file stores on a mobile device
9© 2016 IBM Corporation
Office Document Editor
Work on documents anywhere in an encrypted container for iOS & Android
Collaborate on Word, Excel, PowerPoint & text files
Change fonts, font size & color
Insert images, camera photos, links, shapes, tables & more
Perform searches within documents
Share seamlessly with IBM MaaS360 Secure Mail & to corporate file folders
An office productivity app to create, edit & save documents on mobile devices
10© 2016 IBM Corporation
Enterprise Integration
© 2016 IBM Corporation
Mobilizing Windows 10The move to a unified management paradigm
12© 2016 IBM Corporation
Windows 10 is Here
Windows 10 generally available on July 29, 2015 “Free” upgrades to majority of devices except for Enterprise users First 24 hours – 14 million installs
– At peak - Windows 10 was being installed on about 1500 machines per second Adoption is accelerating: >40% of new Win10 devices since Black Friday Microsoft expects 1 billion devices to be running Windows 10 in 3 years
13© 2016 IBM Corporation
IBM MaaS360 Windows 10 Webinar Poll Results
14© 2016 IBM Corporation
Microsoft has an API set across Windows 10 PC/Tablet and Mobile API set is an extension to Windows Phone 8.1 No API sets on Windows 7 Mac OS X provides a set of management APIs similar to iOS. Apple is working on convergence of management API sets
A Framework for Convergence
15© 2016 IBM Corporation
Windows 10 MDM Grows Up
BYOD: simple security settings
Device Lockdown
Fully managed corporate device
Phone Desktop Phone Desktop
Significant investments in added functionality for both mobile and desktop devices
16© 2016 IBM Corporation
Convergence, Where Are We?
© 2016 IBM Corporation
Enterprise Mobility Management for Windows 10Leveraging MaaS360 EMM for Seamless Deployments
18© 2016 IBM Corporation
Windows 10 MDM
One consistent set of MDM capabilities
across Mobile, Desktop
• Provisioning• Bulk enrollment
• Extended set of policiesClient certificate management
• Enterprise Wi-Fi• VPN management• Email provisioning• MDM Push• Configure trusted Certificates• Device Update control• Kiosk, Start screen, Start menu
configuration and control
• Curated Windows Store• Business Store Portal (BSP) app
deployment; license reclaim• Enterprise App management• App allow/deny lists via Applocker• Enterprise data protection
• Full device wipe • Remote Lock, PIN reset, Ring,
& Find• Enhanced inventory for compliance
decisions
• Unenrollment with alerts• Removal of Enterprise configuration
(apps, certs, profiles, policies) and Enterprise encrypted data (with EDP)
• Additional device inventory
19© 2016 IBM Corporation
Security Policies, Network and Device Restrictions
20© 2016 IBM Corporation
Configure ActiveSync Settings
21© 2016 IBM Corporation
Windows 10 Actions
22© 2016 IBM Corporation
Windows 10 Enterprise Data Protection
Encrypt enterprise data on employee- and corporate-owned devices Remotely wipe enterprise data off managed devices w/o affecting personal data Privileged Apps
– Select specific apps that can access data– Block non-privileged apps from accessing data
Employees not interrupted while switching between personal and enterprise apps while security policies are in place.
https://technet.microsoft.com/en-us/library/Dn985838(v=VS.85).aspx
23© 2016 IBM Corporation
Universal Applications, Store and Software Distribution
Build once – install on all devices Multiple types of applications
– Win32 – “legacy” type of application – APPX, App-V
Business Store for Applications– Acquire and Distribute Applications– Bulk Acquisition of Apps (Free and Paid)– Application Management – reclaim/re-use licenses
© 2016 IBM Corporation
MaaS360 Enterprise Mobility ManagementThe Right Tool for Mobilizing Microsoft and Windows 10
25© 2016 IBM Corporation
Complete mobility management and security
26© 2016 IBM Corporation
Platform for strong mobile security
27© 2016 IBM Corporation
Why IBM MaaS360?
Integratedsolutions that connect
seamlessly to your existing and external environments
Scalabledata security with intelligence for the
volume, speed, and variability of mobile
Completemanagement of
devices, apps, content and users from a single platform
28© 2016 IBM Corporation
Get started right now
InstantAccess a free, fully functional trial for 30 days
MobileManage and secure your devices, apps and content
EasySet up and configure your service in minutes
1 2 3
29© 2016 IBM Corporation
Notices and Disclaimers
29
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
30© 2016 IBM Corporation
Notices and Disclaimers Con’t.
30
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security