February 24, 2015 By Mitch Mayne 3 min read

From coffee shops to planes, trains and cruise ships, workers have become accustomed to readily accessing data from just about anywhere. The problem is that it is easy to forget how vulnerable that makes us to security threats. At IBM, this challenge is no different than the one virtually every company faces today — with the potential exception that there is a staggering scope of mobility inside a corporation of its size.

IBM has roughly 400,000 employees and contractors, approximately 50 percent of whom are mobile or work from a nontraditional office. The company manages more than 700,000 laptops, 5 percent of which are personally owned, and more than 140,000 mobile devices, 85 percent of which are personally owned.

Given that kind of scope, what was the thinking that went into ensuring a diverse global workforce of this size — and the devices used — would be secure? What kind of solution could be flexible enough to give employees access to data they need and simultaneously provide the security necessary to manage a globally integrated enterprise?

These are the questions Bill Tworek, executive architect for the IBM CIO Office, answered Monday in his IBM InterConnect 2015 session, “Security in a Mobile World.”

“Many reports will tell you that mobile is actually supposed to be more secure than traditional computers by as early as 2014,” Tworek said, “but the reality is, for IBM and virtually every other company out there, it’s not just about managing and securing mobile devices. It’s about managing the intersection of several different forces blossoming today: mobile, cloud, IoT, social, consumerization, big data and more. So, you can easily see how the complexity rises incrementally with not only the increasing number and diversity of devices connecting to corporate data, but also the external environmental factors that have to be considered as well.”

Managing Mobile Security

The trick, according to Tworek, is to make sure you focus security where it really matters and give more flexibility where it doesn’t. IBM solves that problem through a five-step philosophy to manage the intersection of the cloud, mobile and other factors:

  1. Establish policy-based legal protections
  2. Recognize the employee as the first line of defense
  3. Create granular and data-focused security paradigms
  4. Focus on design and usability
  5. Leverage cloud speed

The solution for IBM was to effectively eat what it was cooking. IBM deployed its own MaaS360 (previously IBM MobileFirst Protect) solution across the company. The results were pretty impressive, with 70,000 employees enrolling in only one month and projected savings of more than $500,000 from migrating to a software-as-a-service model.

“For IBM, responding to the vanishing state of ‘in the office’ meant we needed to manage both a wide array of devices and locations, coupled with both employee demands for access and the vast amount of environmental factors converging on mobile,” Tworek said. “We had to do all that and retain enough control to keep our data secure and our compliance requirements satisfied. Now, we can.”

Learn more about how other companies are managing mobile in a way that balances the philosophy of giving employees the access they need with the reality of keeping their data safe.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today