IBM Sametime and Facetime


Published on

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • 09/08/09
  • Headquartered in Foster City, CA Founded 1998; 1st IM partnership w/AOL -1999 500+ corporate customers; over 2M seats 8 of top 10 US Banks, 4 of top 5 Canadian Banks, 70% of largest Financial Services 154 employees: N. America, India, EMEA, APAC Privately funded: $30M total since 2001 24 month relationship with XBlock Systems, then acquired them in May 2005 Financials Privately held; industry analysts estimate $8m+ FaceTime provides security and compliance for Greynets – IM, P2P, adware/spyware 650 customers; over 2M seats under management 8 of top 10 YS Banks; 70% of largest Financial Services Horizontal: GE, Apple, Motorola, Medtronic, NCR, DISA FaceTime enables safe use and control of “Greynets” Security: Block worms, protect intellectual property, stop SpIM, scan for malware Compliance: Logging, auditing, archiving messages Management: Applying powerful and granular policies FaceTime has the strongest market position Largest deployed base of seats Largest employee base (150 employees w/ >90 in R&D) Largest security research team (FaceTime Security Labs)
  • BEST PRACTICES DEPLOYMENT 1: Deploy FTEE to ensure compliance and security Guarantee compliance with TrueCompliance TM Stop worms and viruses and block SPIM Stop rogue IM & P2P and block circumvention at the perimeter 2: Monitor and analyze usage patterns Who is using what networks? What features are being used? File transfer, VoIP, app sharing, etc. How much and what P2P usage is going on? 3: Formulate usage policies By user, network and capabilities 4: Implement and enforce policies IMA for logging and audit workflow RTG to control non-compliant use
  • 09/08/09
  • 09/08/09
  • 09/08/09
  • 09/08/09
  • 09/08/09
  • IBM Sametime and Facetime

    1. 1. Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2 ROI without Compromising Security, Management or Compliance
    2. 2. Introducing FaceTime <ul><li>Longest track record in the IM industry </li></ul><ul><ul><li>Founded in 1998; Privately funded </li></ul></ul><ul><ul><li>200 employees (90+ in R&D) </li></ul></ul><ul><ul><li>Global Ops – California, India, Europe, Asia </li></ul></ul><ul><li>Leader in Security, Control and Compliance for Unified Communications </li></ul><ul><ul><li>#1 in market share five consecutive years </li></ul></ul><ul><ul><li>1000+ customers; 3M seats under management </li></ul></ul><ul><ul><li>9 of top10 US Banks </li></ul></ul><ul><ul><li>Reserve Bank of New Zealand </li></ul></ul><ul><li>Strategic partnerships with IBM, Microsoft, and the Public IM network vendors including MSN, AOL, Yahoo, Google, Skype etc. </li></ul>
    3. 3. Some reasons for delayed decision / deployment Non–Compliance Exposure Corporate Acceptable Usage Policies, FSA, SOX, SEC 17a, NASD, HIPAA, GLBA Liability, Freedom of Information Companies Act 2006, MiFID Increasingly Complex <ul><li>Worms/ viruses </li></ul><ul><li>email channels </li></ul><ul><li>Ego-driven </li></ul><ul><li>Network downtime </li></ul><ul><li>SPAM </li></ul><ul><li>Spyware/ botnets/rootkits </li></ul><ul><li>Greynet channels </li></ul><ul><li>Profit motivated </li></ul><ul><li>Stealthy behavior </li></ul><ul><li>SPIM </li></ul>Growth in IM/P2P threats Credit card #, NI#, Patient Health Info, Company Intellectual Property Information Leakage
    4. 4. So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
    5. 5. Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/ Archiving Auditing / Discovery Data Integrity Exporting Policies
    6. 6. Companies are Responding by Deploying Unified Communications <ul><li>Companies starting to roll out EIM </li></ul><ul><li>Deployments increasingly include other UC modalities </li></ul>Security and compliance are key concerns … Resulting in a Heterogeneous Environment
    7. 7. Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
    8. 8. FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
    9. 9. <ul><li>Regulatory Compliance </li></ul><ul><ul><li>NASD, SEC, FERC regulations mandate archiving and review of all communications </li></ul></ul><ul><ul><li>PCI, HIPAA regulations mandate tight control over confidential information </li></ul></ul><ul><li>eDiscovery </li></ul><ul><ul><li>FRCP allows all ESI to be discoverable in federal courts </li></ul></ul><ul><li>Information Control </li></ul><ul><ul><li>Control information flows across myriad channels such as IM, P2P, Web 2.0 </li></ul></ul><ul><ul><li>Enforce communication boundaries in contact centers, on trading desks, etc. </li></ul></ul><ul><li>Security </li></ul><ul><ul><li>Block malware and SpIM especially across multiple channels and federation boundaries </li></ul></ul>“ Must-Have” Requirements for Unified Communications
    10. 10. FaceTime <ul><li>Enabling businesses to leverage the benefits of UC 2 by delivering enterprise-grade solutions that provide management, security and compliance across the broadest set of consumer and enterprise collaborative applications </li></ul>Content Control /Security Compliance & Discovery Management & Reporting Application Visibility / Control
    11. 11. FaceTime Product Portfolio
    12. 12. FaceTime Complements IBM Sametime <ul><li>Day Zero worm blocking & anti-spIM </li></ul><ul><li>Data loss prevention </li></ul><ul><li>Global, group and user-level controls </li></ul><ul><li>IP-address based controls </li></ul><ul><li>Leverage existing AV infrastructure </li></ul><ul><li>Real-time content filtering, scanning, and blocking </li></ul><ul><li>Multi-network support to help during transition to PIC and Sametime </li></ul><ul><li>Standardization and enforcement of Sametime </li></ul>SECURITY
    13. 13. How does this help sell more licences for IBM <ul><li>Deployment is key! </li></ul><ul><ul><li>Some customers will not consider deployment without addressing security and / or compliance concerns. </li></ul></ul><ul><ul><li>Other customers may pilot, but never fully deploy. </li></ul></ul><ul><ul><li>If customers deploy even basic services, additional licences / functionality can be sold. </li></ul></ul><ul><li>FaceTime can support the IBM sale through: </li></ul><ul><ul><li>Supporting the business justification by demonstrating the scale of public real time applications already in use (visibility) </li></ul></ul><ul><ul><ul><li>Standardisation on an enterprise platform and control of the public apps </li></ul></ul></ul><ul><ul><li>Address security, management, control, compliance and reporting concerns when considering Sametime. </li></ul></ul><ul><ul><ul><li>Allows consistency of policy across email and UC 2 </li></ul></ul></ul><ul><ul><li>Federation projects – alleviating security concerns when connecting to external partners and the public networks. </li></ul></ul><ul><ul><ul><li>FaceTime has a unique integration with the Sametime Gateway. </li></ul></ul></ul>
    14. 14. Don’t let any of the following stop / delay your deal <ul><li>Concerns </li></ul><ul><ul><li>Over management and control of public / consumer IM applications </li></ul></ul><ul><ul><li>On how to apply corporate policy for electronic communications to the Sametime environment. </li></ul></ul><ul><ul><li>Over compliance - archiving Sametime conversations for discovery, or exporting to a corporate archive platform </li></ul></ul><ul><ul><li>Over how to secure an external federated connection using the Sametime Gateway. </li></ul></ul><ul><ul><li>Over how to control users when utilising the different modalities in UC 2 (IM, file transfer, voice, video, web conferencing) </li></ul></ul><ul><ul><li>Management / User reporting of all activity across the Sametime environment. </li></ul></ul><ul><li>FaceTime solutions address all of these concerns </li></ul><ul><ul><li>If any of the above are delaying / stalling your deal, involve FaceTime. </li></ul></ul>
    15. 15. Customer and Project examples <ul><li>Example Customers: </li></ul><ul><ul><li>HSBC (235k)- global Sametime compliance and archiving </li></ul></ul><ul><ul><li>Swiss Re: (4k) - Sametime archiving to IBM archiving platform </li></ul></ul><ul><ul><li>BNP Paribas UK (5k) – Sametime & PIM archiving to AXSOne archiving platform </li></ul></ul><ul><ul><li>Societe Generale (18k) – Sametime & PIM management and archiving </li></ul></ul><ul><ul><li>GlaxoSmithKline (60k) – Sametime & PIM security via Sametime Gateway </li></ul></ul><ul><li>Other Projects: </li></ul><ul><ul><li>Intesa San Paolo (10k-80k) – Sametime security, and compliance for internal deployment and external federation to customers. </li></ul></ul><ul><ul><li>Sumitomo (2k) – Sametime security / compliance </li></ul></ul><ul><ul><li>SITA (4k) – Sametime & PIM security for federated connections via ST Gateway </li></ul></ul><ul><ul><li>Zurich Insurance – Security for Sametime federation to outsource providers. </li></ul></ul>
    16. 16. How the FaceTime team can support you <ul><li>In the Sales Process </li></ul><ul><ul><li>Joint campaigns / events </li></ul></ul><ul><ul><li>Joint presentations / sales visits </li></ul></ul><ul><ul><li>Product Demonstrations / evaluations / technical reviews </li></ul></ul><ul><li>Documentation </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li>Datasheets </li></ul></ul><ul><ul><ul><li>FaceTime IMAudtitor for Sametime and Sametime Gateway. </li></ul></ul></ul><ul><ul><ul><li>FaceTime Unified Security Gateway </li></ul></ul></ul><ul><ul><li>Whitepapers </li></ul></ul><ul><ul><ul><li>Securing Unified Communications: From Consumer-Based IM to Enterprise Collaboration and Beyond </li></ul></ul></ul><ul><ul><ul><li>FaceTime solutions for IBM Lotus Sametime </li></ul></ul></ul><ul><ul><li>FaceTime Quick Reference card for IBM Lotus teams </li></ul></ul>
    17. 17. FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
    18. 18. Questions?