forrester research: managing the mobile mix with emm, uem and windows 10
TRANSCRIPT
Managing the Mobile Mix with EMM, UEM and Windows 10FEATURING FORRESTER RESEARCH AND IBM MAAS360
Christian Kane
June 8, 2016
Forrester Analyst
Chuck BrownProduct Manager– IBM MaaS360
2 IBM Security
Housekeeping items
Duration – 60 minutes
Submit your questions to all panelists in the Q&A box located on the right-hand side of your screen
Recording and slides will be emailed to you
© 2016 Forrester Research, Inc. Reproduction Prohibited 3
Topics
› Driving employee productivity
› The Mobile Mind Shift
› Windows 10 and the path to unified endpoint management
81% Higher Customer Satisfaction50% Lower Employee Turnover
Each standard deviation increase in turnover = 40% reduction in productivity and 28% reduction in profit.
Companies with happy employees enjoy:
Flow protects against burnout
© 2015 Forrester Research, Inc. Reproduction Prohibited 7
The Current Workplace
© 2015 Forrester Research, Inc. Reproduction Prohibited 8
The Flow Workplace
But IT *can* solve this one…
A mobile moment is a point in time and space when someone pulls
out a mobile device to get what he or she wants immediately, in
context.
© 2016 Forrester Research, Inc. Reproduction Prohibited 11
Employees Work From Various Locations
From a client site
64% 42%
Base: 3,591 global information workers in enterprises of 1,000+ employees
Home While traveling or commuting
53%
Source: Forrester’s Global Business Technographics Telecommunications And Mobility Workforce Survey, 2016
© 2015 Forrester Research, Inc. Reproduction Prohibited 12
The scale of mobile investment is increasing
• Leverage mobile to improve our ability to innovate81%
• Roll-out new mobile-based products and/or services80%
• Increase the budget in IT to pay for more mobile apps75%
• Increase the budget in business units to pay for more mobile apps71%
© 2016 Forrester Research, Inc. Reproduction Prohibited
What types of applications are you interested in adding or supporting on tablets for employee use?
Apps that access Windows applications or desktops hosted in the data center or at a cloud service
Custom
Reporting/business intelligence
Note-taking applications
Official Microsoft Office app
Web-based corporate apps
Productivity
Web browser access
21%
23%
33%
42%
43%
44%
61%
66%
75%
Basic productivity apps dominate the mobile landscape
Base: N=184 (Enterprise) US infrastructure decision-makers whose firms prioritize personal device technology initiatives and currently support or plan to support tablets for its employees in the next 12 months
Source: Forrester Business Technographics Global Infrastructure Survey 2015
© 2016 Forrester Research, Inc. Reproduction Prohibited 14
Employee expectations give rise to the app gap
© 2016 Forrester Research, Inc. Reproduction Prohibited
App-enabled employees are happier and more productive
© 2016 Forrester Research, Inc. Reproduction Prohibited 16
• Easy onboarding• Single sign-on• App store• Tied to identity• Take advantage of cloud services
EMM helps change the focus
© 2016 Forrester Research, Inc. Reproduction Prohibited 17
Laptop Tablet Smartphone
69%
35%
70%
Base: 7,342 Global information workers
Employees are using more devices for work than ever before
“Which of the following devices (work-provided or personal) do you use at least weekly for work?”
Source: Forrester’s Global Business Technographics Telecommunications And Mobility Workforce Survey, 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited 18
Flow is powered by flexibility and consistency
Flexibility
Consistency
Flow
© 2015 Forrester Research, Inc. Reproduction Prohibited 19
The Chain Of Connections That Powers Every Mobile Interaction
Source: “The Mobile Mind Shift Index” Forrester report
© 2016 Forrester Research, Inc. Reproduction Prohibited 20
Windows 10 Adoption So Far…
BT Device & Security Workforce Survey, 2015
Microsoft Windows 109%
Microsoft Windows 8
24%
Microsoft Windows 744%
Other Microsoft Windows (e.g., XP,
Vista)13%
Apple Mac OS X3%
Linux1%
Google ChromeOS1%
Other1%
Don't know4%
© 2016 Forrester Research, Inc. Reproduction Prohibited 21
Today, Most Companies with > 1000 Employees Have…
21
Antivirus/Antimalware
App Deployment
Patch Management
License Compliance
Entitlement and Policy
© 2016 Forrester Research, Inc. Reproduction Prohibited 22
Can EMM Replace PC Management Tools?
›Visibility, configuration, and app stores will come first
›Patch and image management will slowly wane
›Win32 apps will slow the convergence
›Employees with mobile and modern apps will make the transition more quickly
›One console should not be your goal. Efficiency in management should be your goal
© 2015 Forrester Research, Inc. Reproduction Prohibited 23
MDM•Devices: Smartphones•Access: Email, contacts, calendar
•Support: IT help desk
EMM (MAM + Data)•Devices: Smartphones, Tablets
•Access: Business apps, file sync & share, LOB apps
•Support: Enterprise app stores, self-service portals
Workforce Enablement•Devices: Mobile devices, PCs
•Access: Any app, any data.
•Analytics: Sophisticated analytics (e.g. user context, location)
•Support: Enterprise app stores, self-service portals, Third party help desk (e.g. Geek Squad)
The path to workforce enablement
Stage 1
Stage 2
Stage 3
© 2016 Forrester Research, Inc. Reproduction Prohibited 24
Leadership, Opportunities, Disruptions
›Focus on employee experience and productivity• This means arming employees with the tools they need and clearing
technology roadblocks.
›Prioritize things that employees will find indispensable or make their normal routines easier
• This means more apps, forms, workflows built for the context of the work.
›Look for tools which significantly improve enterprise manageability & security
• Self-service, identity integration, enterprise app store
›Use Windows 10 deployments to begin your unified management and security strategy
UEM and MaaS360
26 IBM Security
Windows 10 will speed adoption of UEM
• Windows 10 generally available on July 29, 2015
• “Free” upgrades to majority of devices except for Enterprise users
• First 24 hours – 14 million installsN̶ At peak - Windows 10 was being installed on about 1500 machines per second
• Adoption is accelerating: >40% of new Win10 devices since Black Friday
• Microsoft expects 1 billion devices to be running Windows 10 in 3 years
1-Jul-15 1-Aug-15 1-Sep-15 1-Oct-15 1-Nov-15 1-Dec-15 1-Jan-16 1-Feb-16 1-Mar-16 1-Apr-16 1-May-160
50
100
150
200
250
300
350
Windows 10 InstallsIn Millions
27 IBM Security
Unified Endpoint Management (UEM) – Definition
Security & Analytics
Application & Data
Device
Identity
• Security Policies• Integration with SIEM• Predictive Cognitive
Analytics• HW & SW reporting• Out of Compliance
Actions
• MDM API policy mgmt.• Client Mgmt.
System Mgmt.• Patch & SW updates• All devices from phones
to servers• OTA Enrollment
• Application distribution w/Catalogs
• W32, Appx, dmg, etc• Identify access to data
and apps• Data Protection
• User Identification• Device identification
by user• Authentication to
AD/LDAPs including Azure
Single Window & Workflow
28 IBM Security
UEM Lifecycle
Policies
Configurations
Application Locations
Compliance
Identity
Enrollment
ManagementReporting
Actionable Intelligence
29 IBM Security
UEM Structure
1. Client Device ̶N Containers (where applicable)̶N Application catalogs
2. Authorization with Identity provider̶N MaaS integrations with AD/LDAP
3. MDM API platform̶N Checking security policy compliance̶N Policy awareness, based on device, user, location̶N Includes App distribution
4. Client Mgt policies̶N Checking security policy compliance̶N Executing updates and installs
5. Access to Enterprise Resources
6. Security Posture reporting
UEM Now with MaaS360 & BigFix
31 IBM Security
What we have – Now!
• MaaS was providing UEM before the term was popular!• We already have the ground work in place
• MaaS has MDM and laptop management in place̶N Currently support all device in MaaS
• iOS, Android, Windows Mobile, Windows PC, Mac OS X• API and agent support• Limited patching and client configuration
• People know usN̶ http://www.brianmadden.com/blogs/jackmadden/archive/2016/04/04/unified-endpoint-management-is-getting-a-lot-of-buzz-but-as-always-the-devil-is-in-the-details.aspx
• Consistent workflows and data presentation
• Cloud based offering
• Easy turn up and configuration
• Cost effective
32 IBM Security
Now
All device in one window
33 IBM Security
Policies
iOSAndroid
Windows Mac OS X
© 2016 Forrester Research, Inc. Reproduction Prohibited 34
Q&A
THANK YOUibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.