2. Nous comprenons vos problèmes de mobilité
☑ Phénomène Bring Your Own Device
☑ Prendre en charge multiples plates-
formes Mobile
☑ Augmenter la productivité
☑ Réduire les risques de sécurité
☑ Se conformer aux règlements de
son secteur
☑ Transformer les Entreprises
*
3. Redéfinition Massive des Priorité de l'IT
3
• Bientôt, les programmes de
fourniture device par l'entreprise
seront l'exception
• Dans 2 ans, 38% des
Entreprises/Organisation pensent
qu'elle auront adopté le BYOD
• L'ensemble du modèle IT pour la
gestion du parc d'appareils Mobile
(déjà supérieur au parc de PC) doit
etre entèrement repensé.* Gartner, “Bring Your Own Device: The Facts & the Future”, 2013
4. Aperçu Général
• 10 Ansdans l'Enterprise Mobility Management
• 5,000Clients dans tous les secteurs d'activité
• 450Employés dans le Monde
• 95% de taux de reabonement client
• La Plus Fort revenus dans les solutions EMM
Cloud
• des Millionsde devices sur la plateforme
MaaS360
Industry Recognition
5. Portefeuil de clients très varié
OthersManufacturing Consumer FinancialHealthcare Public
6. Qu'est ce que Maas360?
6
Contenu de
Collaboration
Sécurisé
Conteneur
Mobile
Sécurisé
Gestion Globale de la
Mobilité
Accès
transparent aux
ressoures
InternesUne plateforme unique pour tous actifs Mobiles
7. Pourquoi les clients préfèrent Maas360?
Très facile à déployer et à monter en charge
Device Mobile, Apps, et Contenus
Plateforme de gestion de sécurisation
Pour les entreprises qui
• Adoptent une approche Multi OS (iOS, Android, Windows Phone)
• Autorisent les programmes Bring-Your-Own-Device (BYOD)
• Développent et déploient des apps Mobiles (publiques ou privées)
• Autorisent les contenus/données professionnelles sur les mobiles en toute sécurité
• Et bien plus encore ….
8. Gestion Globale de Mobilité
Les fonctions essentielles
• Enregistrement par SMS, email, URL
• Profils Email, agenda, contact
• Parametres VPN and Wi-Fi
• Configuration des fonctionalités de
l'appareil
• Changements et Ajustement des
Politiques
• Grestion de Parc
• Rapport de conformité
La gestion avancée
• Gestion des apps Mobiles
• Partage de Documents
• Politiques Basées sur les Evènements
• Contrôl Proactif des Dépenses
• BYOD avec Respect de la vie privée
• Prise en charge des appareils
partagés
• Portail utilisateurs Self Service 8
Location-based policies
Device Enrollment,
Acceptable Use
Enterprise App Catalog
OTA Configuration
8
9. Sécurité Mobile robuste
*
Device
Applications
Network
Email
Documents
Auto-quarantaine / autorisation d'accès
Conteneur pour e-mails et pièces jointes
Effacement à distance des email pro
L'authentification par mot de passe
Restrictions copier/coller, partage
Effacement à distance des fichiers
professionnels
Configurer des profils Wi-Fi et VPN
Certificats et l'authentification
Politique dynamique fondée sur SSID
Chiffrement et mots de passe
détection de Jailbreak / rootage
Localisation, Verouillage,
Effacement
Liste noire / liste blanche des applications mobiles
Définition et mise en conformité des règles
Effacement à distance des applications gérées
Web
Définir des filtres et des catégories d'URL
Autoriser l'accès à des sites intranet
Désactiver 3e navigateurs natif ou tiers
10. Dual Persona : dissocier Vie Privée et Travail
Secure Mail
Secure Browser
Application Security
Secure Documents
10
Container for Mobile Security and Collaboration
MaaS360 Trusted WorkPlace
11. Direct Cloud-to-Cloud
Integration
Direct Cloud-to-Cloud
Integration
Intégration Transparente
Mobilize Apps & Content
on Corporate Networks
11
Integrate with Existing
Enterprise Systems
File Systems
Web Apps
Lotus Traveler
Certificates
Office 365
Exchange ActiveSync
Active Directory/LDAP
Network/Intranet
Box
Google Drive
SharePoint
Cloud Extender™
Mobile Enterprise
Gateway™
IBM Connections
CMIS
Gmail
Web Services
12. MaaS360 Garanti le Succès du BYOD
12
Prend en charge la
diversité des appareils
Dissocie Travail et Vie
privée
Enregistrement simple
et interface utilisateur
familière
Gestion Multi OS et
Sécurité
Conteneurisation des
données et des
paramètres de
confidentialité
Déploiement OTA et
Interface native intuitive
13. La DSI d’IBM enregistre 15,000 Devices le lendemain du
déploiement de MaaS360
Utilisateurs migrés en un
mois
70,000+
$500,000 D’économies réalisées
grace au SaaS
48,000+ Utilisateurs enregistrés
en 15 jours
200+ Utilisateurs par heures*
les 2 premiers jours
*en moyenne
< 500 help desk calls – less
than ½ of 1%
14. Available On-Demand
Essayer Maintenant! (30 jours gratuits)
Accès
Immédiat
30 jours d’essai
gratuit disponible
immédiatement
Mobile
Gérez et sécurisez vos
appareils Mobiles, vos
apps et vos
documents
Facile
Parametrez et
configurez vos
appareils en quelques
minutes
1 2 3
Editor's Notes
<<Use this slide for discovery. Ask probing questions as to why MDM and a broader mobile strategy is important to their business.>>
The use cases between companies and even within an organization among employees can vary greatly.
We understand your mobility challenges because we’ve solved them already for thousands of companies.
Are you getting requests from employees to use personal mobile devices at work? If so, how are you supporting them today?
Do you have a formal BYOD initiative or policy in place? If so, can you describe it for me?
Are you deploying mobile applications to your workforce?
Do you have a need to provide access to corporate documents on these devices?
How do mobile devices connect securely to the corporate network?
How are you managing and enforcing security policies?
Are you concerned about separating and securing corporate data on these devices?
Do you need to ensure compliance with regulations for your business?
What do you see as the biggest challenge in pursuing your enterprise mobility strategy?
Ensemble diversifié de cas d'utilisation dans des industries hautement réglementé ou non-réglementées
Tout, depuis la prise en charge des iPhone, iPad, Android jusqu'à la gestion des programmes BYOD pour sécuriser la messagerie, les applications et Docs pour contrôler les dépenses
La plate-forme MaaS360 offre une solution complète de gestion de la mobilité d'entreprise.
Cette plate-forme intègre une sécurité complète de mobilité comprenant:
Secure Mail
Sécurité App
Secure Document Sharing
Secure Browser
Et la gestion complète de la mobilité :
Mobile Device Management
Gestion des applications mobile
Secure Document Sharing
Mobile Expense Management
Tous ces services travaillent ensemble de façon transparente et fournissent de multiples couches de gestion et de sécurité, et des options de niveaux granulaires de politiques de sécurité à parametrer à votre guise.
Il s'agit veritablement de la plateforme de gestion de la mobilité d'entreprise la plus complète du marché.
La plupart des organisations sont à la recherche de fonctions essentielles de gestion de la mobilité pour commencer.
Ce sont les must-have des fonctionalités
MaaS360 offre la possibilité d'enregistrer les appareils, les configurer à distance, parametrer les courriels, Wi-Fi, et les profils VPN
Vous pouvez également créer et gérer les politiques, et consulter l'inventaire et des rapports de conformité.
Au-delà, les organisations mettent en oeuvre généralement les fonctionalités de gestion plus avancées. Seulement MaaS360 vous donne la possibilité de commencer de façon transparente avec l'essentiel du MDM et la couche sur une gestion plus avancée telles que les contrôles de confinement sécurisées avec Secure Productivity Suite.
MaaS360 vous offre la possibilité de contenir en toute sécurité les e-mails, les applications et les documents, gérer l'accès à l'e-mail, déployer des applications, distribuer des documents à vos équipes, fournir de l'assistance iu du support, et même créer des règles automatiques pour gérer les périphériques.
Une règle commune est relative la mise en place des restrictions si un utilisateur a installé une application qui n'est pas autorisée.
Grâce à notre moteur fondé sur des règles, vous pouvez automatiquement envoyer un message à l'utilisateur lui demandant de supprimer l'application.
Et vous pouvez mettre en place d'autres actions automatiques pour supprimer l'accès aux ressources de l'entreprises si l'action corrective n'est pas prise dans un certain laps de temps.
MaaS360 permet la progression de ces fonctionnalités de gestion de façon transparente.
Vous pouvez fournir les fonctionalités ce que vous souhaitez aujourd'hui et vous pouvez vous préparer pour déployer des fonctions avancées à l'avenir.
Mobile Security is top of mind for IT departments.
The influx of smartphones and tablets accessing corporate data is creating a need to enforce security levels on these devices.
MaaS360 can help you ensure data is not compromised while giving employees access to the information and resources they need.
MaaS360 provides multiple ways to implement mobile security across devices, email, apps, documents, the Web and networks. With MaaS360 you can:
Enforce passcode requirements and encryption
Restrict jailbroken and rooted devices
Full and selectively wipe of devices
Auto quarantine devices trying to access email
Restrict corporate email from being moved
Blacklist applications
Restrict native apps and features on the device
Enforce app compliance
Authenticate user access to apps and docs
Control edit, share, cut and past of docs
Define URL filters and security policies based on categories
Allow access to data on corporate intranet sites
Use certificate based access to email, VPN and WiFi
MaaS360 Secure Productivity Suite delivers a Dual Persona approach to separate personal and enterprise data in this BYOD era. It provides a Trusted WorkPlace container for a complete mobile security and productivity solution with strong data leak prevention (DLP) and consistent and seamless workflows.
It is the only comprehensive cloud-based solution for iOS and Android that enables employees to securely access corporate data while preserving the mobile experience on their personal devices.
Available as a standalone solution without enrolling devices in MDM. Ideal for BYOD programs or working with contractors, consultants and vendors, you can securely share and collaborate without needing to manage and control these devices.
MaaS360 Secure Productivity Suite keeps everything your users need for work in one secure container. They can manage all their emails, contacts, calendars, apps, documents and Web browsing from one dedicated workspace on their mobile devices, no matter what devices they’re using or who owns them.
With policies to control the movement of data, you can restrict sharing by users, forwarding of attachments, and copying and pasting. Devices that are lost, stolen or compromised can be selectively wiped to remove the secure container and everything in it.
It uses a dual persona approach to separate work from play so you can put controls in place to manage this secure container that won't affect the rest of the device.
MaaS360 provides IT teams a wide range of mobile security options to separate corporate and personal information across different categories of users, devices, content, and apps, all within the context of their business. This gives our customers the flexibility to offer tiered or layered mobile security to address their varied end user needs and IT security requirements, from MDM essentials to stricter lockdown capabilities of corporate data for specific users.
For businesses that need stringent security policy and compliance controls, such as those in the highly regulated healthcare and financial services industries, containerization can be especially helpful in making the BYOD experience more palatable for users.
With MaaS360, organizations can phase in BYOD and “right size” their mobile security investments for different classes of users, departments, geographies, devices and applications, and apply the technology approach that best meets the need of those use cases, all from a unified platform.
Components of the Secure Productivity Suite
MaaS360 Secure Mail
A secure office productivity app with email, calendar and contacts.
MaaS360 Application Security
A mobile application container with full operational and security management.
MaaS360 Secure Document Sharing
A fully secure document container with expanded user support to edit content.
MaaS360 Secure Browser
A fully-functional web browser to enforce compliance and control access to content.
Key benefits
Complete set of productivity tools for viewing, editing and sharing
Safely and securely support Bring Your Own Device (BYOD)
Separate personal and corporate data
Reduce risk of sensitive data leakage
Leverage single sign-on for authentication, and on-line and off-line compliance checks
Wipe suite container, app containers, enterprise profiles or whole device
Experience consistent and seamless workflows for iOS and Android devices
Use granular administrative controls and reporting
One of MaaS360 unique differentiators is the ability to provide seamless and simple integration with all of your enterprise investments.
On the left hand side of this diagram, you can see all of the diverse device platforms we can manage and support, including iOS, Android, Windows Phone, BlackBerry, Mac OS X [pronounced “ten”] and Windows PC.
On the upper right hand side of this diagram is our direct cloud-to-cloud integration with popular business applications such as Gmail for work, Google Drive, Box and other web services.
On the right side of this diagram is our MaaS360 Cloud Extender that delivers a unique approach to securely and seamlessly plug-n-play with your enterprise systems including Exchange ActiveSync (EAS 2007, 2010, 2013 and Office365), Active Directory and LDAP, IBM Notes Traveler, BlackBerry Enterprise Server, and Certificate Authorities. Cloud Extender also can plug into content repositories that may be public-facing, such as public SharePoint, IBM Connections and CMIS content sources (Content Management Interoperability Services: http://en.wikipedia.org/wiki/Content_Management_Interoperability_Services).
This is an optional feature that allows you to control access to email, leverage Active Directory groups for policies, authenticate against corporate credentials, manage certificates for advanced user authentication, provide secure access to corporate systems (e.g., a certificate for Wi-Fi network authentication), and take actions through those systems (e.g. block email on a compromised device).
It was designed to be easy and straightforward, without the need for on-premise servers or network reconfigurations. It’s a small lightweight software module that you install in your environment.
MaaS360 Cloud Extender ties into your backend systems in a completely non-intrusive way and is not inline proxy with your critical messaging flows, so it is not in the direct path of email. Therefore, if somehow Cloud Extender goes down, email delivery is not interrupted, like with our competitors. And through APIs, it can integrate with other IT systems, such as identity management and network access controls.
And on the lower right hand side, I’ve already mentioned our MaaS360 Mobile Enterprise Gateway which ties into behind-the-firewall business resources, such as private SharePoint, IBM Connections, CMIS, Windows File Share, web apps, intranet sites and databases.
Our customers really appreciate how we make it super simple to mobilize enterprise resources on your employees’ devices, so they can be productive on-the-go while you’ll have the peace of mind with robust mobile data security.
MaaS360 secures smartphones, tablets & laptops, including iOS, Android (and variants including Samsung, LG, HTC, Motorola), Windows Phone, BlackBerry, Windows XP SP3, Vista, 7, 8+, and Mac OS X.
MaaS360 BYOD Privacy Settings blocks the collection of personal information, such as location information and personal apps on devices.
In the time it took to have this conversation, you could have already been up and running with a comprehensive MDM solution.
You can start immediately, as there is no infrastructure or paperwork for you to deal with.
You can try it with your own devices, in your environment, and make an informed decision…
It’s fully functional with no limits on the number of devices you can enroll or features you can evaluate.
And best of all, your trial environment is your production environment. No need to re-enroll devices or set up your policies again.
All you need to do is set up an account and configure your services.
And our dedicated customer success team can show you how to get the most out of your evaluation.
So we invite you to get started right now! Let’s do this!