beyond byod
TRANSCRIPT
© 2015 IBM Corporation
Jim Lundy – Aragon Chris Poulin – IBM July 23, 2015
Beyond BYOD: Securing IoT in the Enterprise for Employee Productivity
2 © 2015 IBM Corporation
Introductions
Jim Lundy CEO and Lead Analyst
Aragon Research
Chris Poulin Research Strategist
IBM
3 © 2015 IBM Corporation
Housekeeping items
Duration – 60 minutes Submit your questions to all
panelists in the Q&A box located in the bottom right corner of your screen
Recording and slides will be emailed to you
The Future of Work is Digital
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the
onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 5
Computing is Shifting….to Mobile
Speech UI Predictive Apps Cognitive Apps
Mainframe PC Tablet Wearable/IOT
1964-1981 1981-2011 2011- 2015-
© 2015 Aragon Research Inc. All Rights Reserved. 6
Batch Processing
Desktop Apps Client/Server
Mobile Apps Digital Paper APIs
Paper Copying Faxing Email
Social Mobile Apps Cloud
Work Tools Digital Assistants Predictive Apps Drones/Robots
The Major Trends Driving Innovation in Business
Strategic Assumptions Computers and Humans will work closer together than ever before.
Technology becomes a Competitive Weapon in Business.
IOT is about Connecting Everything
1.3 Billion Devices 2.5 Million Apps
2014
2020 4 Billion Phones
30 Million Apps
700 Million Devices
400 Million Tablets
The Impact of IOT on Work
9
Find Content via Voice Continue in Car
Worker Activity - iBeacon
On the Go
Innovation and Market Disruption in a Digital Era
Taxi Uber Taxi App
App Economy
1894- 2012-
Electric Cars
Gas Powered Car Electric Car
2009- 1897-
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change?
• What are the best practices to prepare for the onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 11
Aragon Research Technology Arc for Mobile, 2015 – Collaboration is the driving force
Emerging Technologies being Adopted as Fast as Mature ones.
The Shift from Mobile to IOT
EMM Expands to Wearables and IOT
Enterprise Mobile Management
PC / Server Management
More Devices and More Apps
Wearables: Making Work and Life Simpler?
Hotel Check-in Airlines Dining Exercise
Content Email
Home Control
CRM
IOT will cause an App Explosion
30 Million
4 Million
2015 2020
Homes
Cars
Buildings
Devices
Apps Everywhere Business Disruption Executives Need to Understand Mobile Enterprises need to war game scenarios
App Growth
Security is Mission Critical
16 Enterprises need to invest more in Security Software.
Executives Are
Targets
Your IP is at Stake Your Executives are being targeted.
Agenda
• What are the key trends in enterprise mobility? • How will IoT and wearable devices impact the
enterprise and how will BYOD initiatives change? • What are the best practices to prepare for the
onslaught of new devices in the enterprise?
© 2015 Aragon Research Inc. All Rights Reserved. 17
Enterprise Mobile Management is Strategic
Enterprise Mobile
Management
Mobile Device
Management
Mobile App Management
Mobile Content
Management
© 2014 Aragon Research Inc.
Elements of an EMM Strategy
19
Policy for New Devices
Update Approach for IOT
Security for Apps
Update your Mobile App Strategy
20
Apps that will benefit from Wearable Interface
Access a Service Easy to access a
Cloud app
Content Distribution News Training Content Books Movies, Music Games
Market the Business Location finder Brand awareness
Redefine the user or the Customer Experience - Leverage
Wearables - IOT As Business
Strategy
Where to Start
1. Mobile Devices for Mobile Work
2. Prepare for Wearables
3. Understand IOT 4. Apps as a Business
Strategy
Mobile
Mobile App Jam
Mobile and the Future of Software
Mobile First Apps are here
IoT Era has arrived Develop a Strategy to Manage
Devices besides Phones EMM is a critical Success Factor Don’t wait to Deploy
Enterprises should adjust current
policies relative to New Devices and Apps
Summary
24 © 2015 IBM Corporation
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU www.ibm.com/security