unified device management
DESCRIPTION
Track: Mobility in the EnterpriseTRANSCRIPT
© 2013 IBM Corporation
Unified Device Management Keith Poyser
IBM Tivoli End Point and Mobility
UK
29th of May 2013 - Copenhagen
Martin Vittrup
IBM Tivoli End Point and Mobility
Denmark
1
Critical systems are globally distributed and in constant flux
Visibility is key in a constantly changing, distributed world
1
Find all assets on your network – NOW!
Deploy a software application worldwide in
days.
Patch hundreds of thousands of workstations, laptops and
servers in minutes.
Continuously enforce security configuration baselines, even on mobile and off-network devices.
Patch anywhere, anytime over any network.
Find, Manage and Secure your BYOD and Smart Devices
2
Endpoint complexity continues to increase
Endpoint
device counts,
devices and
platforms
Compliance
requirements
to establish,
prove and
maintain
continuous
compliance
Speed,
severity and
complexity of
malware
attacks
Patch O/S and application
vulnerabilities within hours
Rapid, agile, automated
remediation is needed
Mobile/roaming endpoints
New form factors and platforms
Employee-owned devices
Establish, prove and
maintain continuous
compliance
3
Why Unified Device Management?
Management needs changes constantly
Mobility of Laptops – Introduction of Mobile Devices
Plethora of Operating systems with different Management
needs
Threats constantly evolving
Restrictions and regulations tightened
More demand of Automation of tasks
End User influence - Demands
Investments around making IT part of business.
4
Why Unified Device Management?
Many point solutions
No total overview
Differentiated management story
Difficult to prove compliance
5
Unified Device Management with IBM
One tool for every management aspect of Endpoints
One overview of every Endpoint in the evironment
One server for up to 250.000 Endpoints
One way of thinking
One easy to implement solution to save money
And what is it then it can do?
6
Endpoint Spectrum
IBM’s Strategic Focus: Heterogeneous Endpoint Management with Converged Security and Lifecycle Management
Lifecycle and Security Management across multiple
end points – user roles with multiple devices
Delivers common, policy based lifecycle endpoint
management across heterogeneous end point types
Provides real time visibility and automates tasks
such as device configuration, software distribution,
enforce security settings, migration and retirement
Endpoint lifecycle and security management is a
critical component of end to end service
management
MOBILE ENDPOINT
DESKTOP / LAPTOP / SERVER ENDPOINT
PURPOSE SPECIFIC ENDPOINT
Meters &
Measurement Structures
Trains /
Rolling Stock ATM / POS
INTELLIGENT ASSETS
Security Protecting
the enterprise
against internal
and external
threats
Audit
Compliance Proving that you have
met regulation and
governance and are
meeting security
standards
Operations The day to day activities
associated with aintaining
IT configurations
6
7
IBM Endpoint Manager
Endpoints
One Common Solution:
Overview of every Endpoint in your
environment – From the Data-
center to the Device
Unified management console:
Access to all functions – or limited
to the individual operators
responsibilities.
Common management agent:
Regardless of management
functions, only one Client Agent
required
Common infrastructure:
All functions share the
Infrastructure – and plugs in to
existing infrastructure
Single server:
One Management server can
support 250.000 Devices
Patch
Management
Lifecycle
Management Software Use
Analysis
Power
Management
Mobile
Devices
Security and
Compliance
Core
Protection
Systems Management Security Management
Server
Automation
From the Data-Center to the Desktop to the Device
8
Overview of Patch Management
Start with the Patch
Management domain
The patches dashboard provides a
real-time view on Windows patches
requirement across your environment
See any New
Content here
Application vendor patches
• Adobe Acrobat
• Adobe Reader
• Apple iTunes
• Apple QuickTime
• Adobe Flash Player
• Adobe Shockwave Player
• Mozilla Firefox
• RealPlayer
• Skype
• Oracle Java Runtime Environment
• WinAmp
• WinZip
…and operating
system patches
9
Power Consumption Summary Total Power Consumption for all
devices is summarised on this
dashboard
Which includes your Total Current
Power Usage (kWh, Cost and Green
House)
Potential savings are also
identified The breakdown of power usage for
workdays and weekends is now
available
10
Power Management: End-User Dashboard This optional client dashboard can be
displayed on client workstations
Which shows the user their current
power footprint and how much energy
they can potentially save
11
Handle Multi-Platform Complexities With Ease
Device management via Android agent, iOS APIs, Lotus Traveler, Microsoft Exchange, and Office 365
Complete device hardware and software inventory in near real-time
Web reports provide at-a-glance mobile device deployment overviews
Pass mobile device data to network management, service desk, asset management, and security and compliance systems
Multi-tenancy support for service providers and organizations that need to completely separate different parts of the organization
Better plan internal mobile projects with easy
access to near-real time data about your mobile
environment.
12
12
IBM Endpoint Manager + Divide
Complete MDM BYOD Solution
Dual Persona
Leverages the sophisticated policies and
features of IBM MDM and Endpoint
Management
Management of Divide as a “virtual device”
including safe, secure distribution and
management of apps
+ +
Immediate solution for BYOD challenges
and security concerns for Mobility OS’s
Seamless delivery: same Divide App,
binding to IBM MDM at time of enrollment
Business Apps IBM Endpoint Manager
13
Customer Needs Key Features & Outcomes
IBM Office of the CIO then includes Mobile…
Support BYOD for a variety of mobile platforms securely for a highly mobile population
Scale to hundreds of thousands of devices
120,000 mobile devices, 80,000 personally owned, supported in months
Integrated Lotus Traveler, IBM Connections, IBM Sametime, and IBM Endpoint Manager
Extending Corporate Access
“IBM's BYOD program “really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business.” Jeanette Horan, IBM CIO
14
Benefits of Unified Device Management
14
“Organizations…would prefer to use the same tools across PCs, tablets and smartphones,
because it's increasingly the same people who support those device types”
– Gartner, PCCLM Magic Quadrant, January 2011
Although at some level mobile is unique, the devices are just another form of endpoints in your
infrastructure. This means whichever technologies you procure should have a road map for
integration into your broader endpoint protection strategy.
– Forrester, Market Overview: Mobile Security, Q4, 2011
Reduces Hardware & Administration Costs
• “Single pane” for mobile devices, laptops, desktops, and servers
• Single Endpoint Manager Server scales to 250,000+ devices
• Unified infrastructure/administration model reduces FTE requirements
Fast Time-to-Value
• Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management)
• Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required
15
Benefits
1
5
- One solution to handle all Endpoints in your environment – from the
Datacenter to the Desktop to the Device
- One Management Server to support 250.000 Endpoints saves you
investment in Hardware and Infrastructure
- One Inteligent Agent gives you real-time information about your
Endpoints
- One Unified Management Console reduces enablement and
administration costs
16
Questions?
17
1
7
17