ios 10: more power and security for your mobile strategy

17
© 2015 IBM Corporation More Power and Security for Your Mobile Strategy Joshua Lambert IBM MaaS360 CTO iOS 10 with IBM MaaS360

Upload: ibm-maas360

Post on 23-Jan-2017

88 views

Category:

Mobile


1 download

TRANSCRIPT

Page 1: iOS 10: More Power and Security for Your Mobile Strategy

© 2015 IBM Corporation

More Power and Security for Your Mobile Strategy

Joshua Lambert

IBM MaaS360 CTO

iOS 10 with IBM MaaS360

Page 2: iOS 10: More Power and Security for Your Mobile Strategy

2 © 2015 IBM Corporation

Housekeeping items

Duration – 60 minutes

Submit your questions in the Q&A box

located on the left-hand side of your screen

Recording and slides will be emailed to you

Page 3: iOS 10: More Power and Security for Your Mobile Strategy

3 © 2015 IBM Corporation

Today

iOS 10 ‘At a Glance’

– Supported Devices

– Extensibility arrives to more parts of iOS

Key Enterprise Features in iOS 10

Leveraging iOS 10 with MaaS360

Page 4: iOS 10: More Power and Security for Your Mobile Strategy

4 © 2015 IBM Corporation

iOS 10 – At a Glance

Released Sept 13th, next major version of iOS for:

– iPhone 5+

– iPad 4th gen, Mini 2nd gen+, Air, Pro

– iPod Touch 6th gen+

Hundreds of new features, including:

– Significantly enhanced iMessage app

– Improvements to notifications, and “Raise to Wake”

– Redesigned & Improved Music, Photos, Maps, Notes apps

– Hide default apps, faster JavaScript, little impact to old devices

10% of MaaS360 devices running iOS 10 in less than a week

Page 5: iOS 10: More Power and Security for Your Mobile Strategy

5 © 2015 IBM Corporation

iOS Extensions – Opening up the Platform

What are iOS Extensions?

– Extensions are parts of iOS that Apple has opened to allow 3rd party

developers to integrate with

• Extend and enhance core functionality

– Transformative effect on the iOS user experience

iOS 8 and 9 Extensions

– Share & Action Extensions

– Photo Editing, Keyboards, Ad Blockers and more

Page 6: iOS 10: More Power and Security for Your Mobile Strategy

6 © 2015 IBM Corporation

Extensions in iOS 10 – iMessage

iMessage was a key focus area for iOS 10

– Invisible Ink, full screen effects, tapbacks, animations, drawing, and

even 🤓 suggestions!

• … you’ve probably already seen some of these in your conversations already

Also added Extensions and Stickers

– Stickers are images you can drop into conversations

– Extensions allow apps to plug into the conversation

• Can be simple links, but also group participation!

Page 7: iOS 10: More Power and Security for Your Mobile Strategy

7 © 2015 IBM Corporation

Extensions in iOS 10 – Maps

Among other improvements, Extensions have been added

– Direct integration with ride sharing apps in a dedicated tab

• Allows you to directly book Uber, Lyft, etc.

– General purpose integration also available

• Book a table directly within Maps!

If you haven’t recently, give Maps another try

– Extensibility, new UX, great Transit, improving maps

Page 8: iOS 10: More Power and Security for Your Mobile Strategy

8 © 2015 IBM Corporation

Extensions in iOS 10 - Siri

Siri’s can now assist across many new categories

– VoIP Calling, Messaging, Payments, Photos, Workouts, Rides,

Reservations, and CarPlay

– Too many capabilities to list, so lets see some examples

Just made a reservation, sent a message, got a ride

– … all through 3rd party apps without touching my phone

Page 9: iOS 10: More Power and Security for Your Mobile Strategy

9 © 2015 IBM Corporation

Extensions in iOS 10 - Calls

VoIP apps can now be integrated into the OS cleanly

– Whatsapp, Cisco Spark, Viber and more support this today

VoIP and Cell calls handled transparently

– Incoming calls now display similar to Cellular calls on Lock screen

• Call waiting and hold can transition between VoIP and Cell

– Recents, Address Book, and other Contact features also support dialing

via 3rd party apps

Page 10: iOS 10: More Power and Security for Your Mobile Strategy

10 © 2015 IBM Corporation

Extensions in iOS 10 - Notifications

Significant improvements, enabled by new Extensions

– Apps can now process new and old notifications before shown

• No more endless stacking of notifications?

• Can enrich the notification with titles, subtitles, and media

– Thumbnails and other attachments can be shown to users

Notifications can also interacted with on lock screen

– Opportunity to display more content on 3D Touch

• Can pull up a view of nearby meetings for invitation

– Can offer simple interaction methods as well

• Text conversation without unlocking phone

Page 11: iOS 10: More Power and Security for Your Mobile Strategy

© 2015 IBM Corporation

Key Enterprise Features in iOS 10

Page 12: iOS 10: More Power and Security for Your Mobile Strategy

12 © 2015 IBM Corporation

Security Improvements in iOS 10

Increased 3rd party app security

– App Transport Security - now required Jan 1 2017

• Requires HTTPS, TLS 1.2 & AES-128 for network activity

– Removing vulnerable TLS cipher suites like RC4, SSLv3

Improvements to WebKit JIT Security

– Makes attacks like Pegasus/Trident much harder

iOS updates have moved to HTTPS

– Prevent attackers on network from interfering with updates

– Keep this in mind if you have used a network based method of slowing

updates!

Page 13: iOS 10: More Power and Security for Your Mobile Strategy

13 © 2015 IBM Corporation

Management changes in iOS 10 – Minor Update

Migrated some Restrictions to Supervised Only

– FaceTime, App Installation/Removal, Safari, iTunes, iCloud Docs/Data...

– If you aren’t using DEP, we strongly recommend you to do so

– New supervised options to prevent Bluetooth modifications

VPN Changes

– PPTP support has been removed from iOS 10

– IKEv2 only supports EAP for authentication

Cisco QoS marking on WiFi

– Can define which apps are allowed to be prioritized

Define default Call app for enterprise contacts

– Cisco Spark, Lync, and other VoIP apps

Page 14: iOS 10: More Power and Security for Your Mobile Strategy

14 © 2015 IBM Corporation

Refresher on important iOS 9.3 Changes

Control which apps appear on the Home screen

– Can either blacklist or whitelist specific apps

New Restrictions

– Apple Music, iCloud Photo Library, modify Notifications settings, …

Notification Settings

– Control how notifications appear for specific apps

• Can hide content from being displayed on Lock screen

New IKEv2 Settings

New option to allow iCloud MailDrop for Mail accounts

Page 15: iOS 10: More Power and Security for Your Mobile Strategy

© 2015 IBM Corporation

Leveraging iOS 10 with MaaS360 Demo

Page 16: iOS 10: More Power and Security for Your Mobile Strategy

© 2015 IBM Corporation

Q&A Submit your questions to the Q&A widget on the upper left of your screen

Page 17: iOS 10: More Power and Security for Your Mobile Strategy

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any

kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor

shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use

of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or

capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product

or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries

or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside

your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks

on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.

IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other

systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU www.ibm.com/security