SlideShare a Scribd company logo
1 of 32
Download to read offline
Cognitive unified endpoint management
Biju Tilak
MaaS360
2 IBM Security
Traditional mobile device
management solutions were
built for a simpler time.
Today’s IT leaders
have bigger ambitions.
3 IBM Security
Traditional client management Modern API management+
Technology convergence is changing the game
4 IBM Security
Unified Endpoint Management (UEM)
is the first step to enable today’s enterprise ecosystem.
Devices and things People and identity Apps and content
5 IBM Security
1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017..
of companies will use artificial intelligence (AI) or
cognitive computing to analyze endpoint data by 2020.> 80%
Cognitive technology
helps you deliver on
their expectations.
They expect
convenience.
Your employees
are consumers.
+
Balance control, deliver on expectations
=
6 IBM Security
Cognitive technology gives IT and
Security leaders the power to see:
• What happened
• What can happen
• What should be done
All in the context of your environment.
7 IBM Security
Cognitive offers a new approach
• Digging through news & blogs randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best practices ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
8 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Trusted Advisor
Augmented intelligence and cognitive computing
Actionable insights Contextual analytics
Apps and content People and identity
Apps Content Data Identity Threats Connectivity
Devices and things
Smartphones Tablets Laptops Wearables Internet of Things
Identity Management
10 IBM Security
• Seamless user experience with SSO to cloud
apps from desktop or mobile
• Conditional access preventing access from
unmanaged or non-compliant devices
• Instant on without any installation or infrastructure
• Flexible integration supports existing AD and
LDAP directories
• Bundled with MaaS360 additional licenses not
required
Enable access management through MaaS360 UEM New
SSO to Mobile, Web/SaaS apps
Identity Federation
Self-Service App Request
Onboarding, Provisioning
Step-up Authentication, MFA
Conditional Access Management
Threat and Risk Management
IBM Cloud Identity
11 IBM Security
Device Authentication
(Native Mobile SSO)
User launches
Application
SaaS/Web
applications
Native Mobile App SSO from a mobile device to enterprise resources
via integration with IBM Cloud Identity
IBM Cloud Identity
Connect
SAML SSO
12 IBM Security
Managed by MaaS360
Unmanaged APPROVED APPS
Provides SSO with conditional access ensuring only trusted
devices and applications can access enterprise resources
Compliant with IT Policy
Access granted
SSO to apps
Access denied
IBM Cloud Identity
This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
13 IBM Security
Addressing user pains with application access
Mobile Apps SaaS Apps
EMPLOYEE LINE OF BUSINESS IT SECURITY
USER PAINS • Multiple usernames and
passwords
• Difficult to find applications
• No idea how to request
access
• Current tools aren’t user
friendly
• Shadow IT costs are
expensive
• Too much time waiting on IT
• Loss of control over data
• Infrastructure costs
• IT skill dependencies
• Loss of security over data
• Roadblock for the business
• Heritage tools aren’t user
friendly
14 IBM Security
Plan for Identity Management with IBM Cloud Identity
Embedded Cloud Identity extends the MaaS360 platform and provides single sign-on with
conditional access to cloud applications
Web SaaS App SSO,
Identity Federation
Mobile Native App SSO,
Conditional Access Management
(iOS only, Q4 Android)
Single touch access
to mobile, web/SaaS apps
boosts productivity
Identity federation using
pre-integrated connectors to
popular SaaS applications
Conditional access ensures
only trusted devices, apps
access enterprise resources
Threat Management powered
by x-force exchange provides
risk data for apps
Stand-alone Identity and Access
Management platform with built-
in integration with MaaS360
Interoperability with 3rd party
Identity Providers allows
customers to leverage their
existing investments
Threat and Risk Management
IBM Cloud Identity
NOTE:
* Identity Management equates to IBM Cloud Identity Essentials
and does not include “Verify” (MFA) or the “ISAM Connector”.
This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
15 IBM Security
Leading macOS management services
MaaS360 covers all your macOS management needs
Enterprise Features
• Easy User Enrollment
• Remote Lock, Wipe
• Comprehensive macOS management
• Full API driven Profile management for Email, VPN,
Wi-Fi, Printer, Login window configuration with
certificates integration
• Enroll using DEP
Greater Security
• OS Restrictions for Apps, Updates, Media etc.
• FileVault provisioning, reporting and protection
• Endpoint Security Reporting for Firewall, Antivirus,
Encryption
• Patch & App Updates
macOS Sierra
OS X El Capitan
Apps
• Software Distribution
• App Store
• Remote Control
16 IBM Security
Software Distribution | OS / App Patch Management
17 IBM Security
Best in class to manage Windows 10
With MaaS360 and Windows 10, you can manage your smartphones and laptops
with all the ease that you have come to associate with MaaS360
Provisioning Windows 10 Devices
• Easy device enrollment
• Wi-Fi, VPN Configurations
• Locate action and more
• Out of box enrollment for Windows 10 devices
Greater Security
• More Passcode configurations
• Full Certificates lifecycle Integration
• Apps Compliance
• Enterprise Data Protection for Documents
• Health Attestation
• Compliance Rules
• Advanced Patch & 3rd party App Updates
Apps
• Software Distribution
• App Store
• Remote Control
Window 10
Support
18 IBM Security
Software Distribution | OS / App Patch Management
Appendix
COGNITIVE UEM EDITIONS
20 IBM Security
with Watson – cognitive UEM editions
Solution Essentials Deluxe Premier Enterprise
Device Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
App Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
Patch and Update Management ✔ ✔ ✔ ✔
Identity Management ✔ ✔ ✔ ✔
Advisor ✔ ✔ ✔ ✔
Container App ✔ ✔ ✔ ✔
Mobile Expense Management ✔ ✔ ✔ ✔
Secure Mobile Mail ✔ ✔ ✔
Secure Mobile Chat ✔ ✔ ✔
OS VPN ✔ ✔
Secure Browser ✔ ✔
Gateway for Browser ✔ ✔
Content Management ✔ ✔
Gateway for Documents ✔ ✔
App Security ✔ ✔
Gateway for Apps ✔ ✔
Mobile Document Editor ✔
Mobile Document Sync ✔
Mobile Threat Management ✔
TeamViewer Remote Support O O O O
21 IBM Security
App Management
Deploy custom enterprise app catalogs
Blacklist, whitelist & require apps
Administer app volume purchase programs
Device Management
Manage smartphones, tablets & laptops
featuring iOS, Android, Windows 10
Mobile, Windows 7, Windows 10 &
macOS
Gain complete visibility of devices,
security & network
Enforce compliance with real-time &
automated actions
Essentials Edition – a great first step for cognitive UEM
Patch & Update Management
Identify & report on missing OS patches
Schedule distribution and installation of
Windows OS & macOS patches
Determine outstanding updates to third
party Windows and macOS applications,
like Java & Adobe
Identity Management
Single sign-on & touch access
Conditional access to trusted devices
Identity federation with apps
22 IBM Security
Container App
A separate, corporate mobile workplace
for iOS, Android & Windows
Productivity apps for work in one place
Data leak prevention controls to restrict
copy-paste & forwarding of content
Advisor
Boost user productivity by identifying policy and app deployment
enhancements
Discover security vulnerabilities & emerging threats to endpoints,
apps & data
Improve IT operational efficiency by applying best practices &
learning from industry & peer benchmarks
Essentials Edition – a great first step for cognitive UEM
Mobile Expense Management
Monitor mobile data usage with real-time alerts
Set policies to restrict or limit data & voice
roaming
Review integrated reporting & analytics
23 IBM Security
Deluxe Edition – add email and chat containerization
includes all solutions from Essentials Edition
Secure Mobile Mail
Contain emails, attachments & chat to prevent data leakage
Enforce authentication, copy/paste & forwarding restrictions
FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Secure Mobile Chat
Enhance on-the-go collaboration and productivity
Contain all chat mobile conversations and data
Establish quick connections via corporate directory lookup
24 IBM Security
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
Secure Browser
A feature-rich web browser for secure access to intranet sites
Define URL filters & security policies based on categories
Block known malicious websites
OS VPN
Preserves the native VPN experience for iOS and Android users
Leverages the hosted MaaS360 Certificate Authority to issue authentication certs
Deployed alongside your corporate VPN solution
Gateway for Browser
Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web
apps & network resources
Access seamlessly & securely without needing a VPN session on mobile device
25 IBM Security
Gateway for Documents
Secure access to internal files:
e.g., SharePoint & Windows File Share
Retrieve enterprise documents without a VPN
session
Content Management
Contain documents & files to prevent
data leakage
Enforce authentication, copy/paste &
view-only restrictions
Access distributed content/repositories:
SharePoint, Box, Google Drive &
OneDrive
App Security
Contain enterprise apps with a simple
app wrapper or SDK
Enforce authentication & copy/paste
restrictions
Prevent access from compromised
devices
Gateway for Apps
Add per app VPN to Application
Security to integrate behind-the-
firewall data in private apps
Incorporate enterprise data without a
device VPN session
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
26 IBM Security
Enterprise Edition – the ultimate package for protection & productivity
includes all solutions from Deluxe Edition
Mobile Document Sync
Synchronize user content across managed devices
Restrict copy/paste & opening in unmanaged apps
Store content securely, both in the cloud & on devices
Mobile Document Editor
Create, edit & save content in a secure, encrypted container
Collaborate on Word, Excel, PowerPoint & text files
Change fonts & insert images, tables, shapes, links & more
Mobile Threat Management
Detect and analyze mobile malware on compromised devices
Automate remediation via near real-time compliance engine
Take action on jailbroken/rooted devices over-the-air
27 IBM Security
TeamViewer Remote Support for IBM MaaS360
• Connect in seconds to obtain real-world remote device views and perform remote control functions
• Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops
• Conduct remote device configurations, provisioning, remediation of connectivity issues and more
• Reduce the volume of IT help desk calls and
emailed requests for device support
• Increase productivity for IT administrators and end users
28 IBM Security
Next steps
Demo
Participate in a
deep-dive demo
with our experts
Deploy
Start managing and
securing your mobile
environment
Evaluate
Set up and
configure your
custom trial service
1 2 3
29 IBM Security
Strong adoption in the enterprise
Manufacturing Consumer Public Others
Trusted by over 14,000 customers
Financial Healthcare
30 IBM Security
Complete
UEM
of mobile devices,
laptops & things
Best-in-class
cloud
on a mature,
trusted platform
Open
platform
for integration with
leading IT systems
for actionable insights
& cognitive analytics
What sets IBM MaaS360 apart
Industry-best
user interfaces
for app catalogs &
workplace container
Dedicated to
your success
with 24x7x365 support
by chat, phone, email
31 IBM Security
Best-in-class cloud delivery model
Fast deployment
Simple, self-service
provisioning process
designed for maximum
configurability
Effortless scalability
Trial instantly becomes
production environment
with ability turn up new
devices, users, apps
Automatic upgrades
Continuously updated daily
with new capabilities
and same day OS support
for the latest platform
Cloud expertise
Dedicated team
supporting a mature
platform with unmatched
security certifications
Agility of the cloud for the pace of change in mobility
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
https://www.youtube.com/user/ibmse
curitysolutions
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

More Related Content

What's hot

Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonJohn Billings CISSP
 
Oracle Cloud Infrastructure – Compute
Oracle Cloud Infrastructure – ComputeOracle Cloud Infrastructure – Compute
Oracle Cloud Infrastructure – ComputeMarketingArrowECS_CZ
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
BATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API ManagementRui Santos
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationPriyanka Aash
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability ManagementMarcelo Martins
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessRobert Crane
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...apidays
 
IBM App Connect - Let Your Apps Work For You
IBM App Connect - Let Your Apps Work For YouIBM App Connect - Let Your Apps Work For You
IBM App Connect - Let Your Apps Work For YouIBM Integration
 

What's hot (20)

Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby SheltonA Risk Based Approach to Security Detection and Investigation by Kelby Shelton
A Risk Based Approach to Security Detection and Investigation by Kelby Shelton
 
Oracle Cloud Infrastructure – Compute
Oracle Cloud Infrastructure – ComputeOracle Cloud Infrastructure – Compute
Oracle Cloud Infrastructure – Compute
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
BATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data Mesh
 
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
2015/06/12 - IBM Systems & Middleware - IBM DataPower and API Management
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Application Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & DefensesApplication Security: AI LLMs and ML Threats & Defenses
Application Security: AI LLMs and ML Threats & Defenses
 
Patch and Vulnerability Management
Patch and Vulnerability ManagementPatch and Vulnerability Management
Patch and Vulnerability Management
 
Iso 27001
Iso 27001Iso 27001
Iso 27001
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
Introduction to Microsoft 365 Business
Introduction to Microsoft 365 BusinessIntroduction to Microsoft 365 Business
Introduction to Microsoft 365 Business
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
 
IBM App Connect - Let Your Apps Work For You
IBM App Connect - Let Your Apps Work For YouIBM App Connect - Let Your Apps Work For You
IBM App Connect - Let Your Apps Work For You
 

Similar to IBM MaaS360 with watson

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 

Similar to IBM MaaS360 with watson (20)

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

More from Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contractingPrime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marPrime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsPrime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - NetmagicPrime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft TeamsPrime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a TargetPrime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentationPrime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 

More from Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 

Recently uploaded

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Delhi Call girls
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Pooja Nehwal
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedDelhi Call girls
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 

Recently uploaded (18)

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 

IBM MaaS360 with watson

  • 1. Cognitive unified endpoint management Biju Tilak MaaS360
  • 2. 2 IBM Security Traditional mobile device management solutions were built for a simpler time. Today’s IT leaders have bigger ambitions.
  • 3. 3 IBM Security Traditional client management Modern API management+ Technology convergence is changing the game
  • 4. 4 IBM Security Unified Endpoint Management (UEM) is the first step to enable today’s enterprise ecosystem. Devices and things People and identity Apps and content
  • 5. 5 IBM Security 1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017.. of companies will use artificial intelligence (AI) or cognitive computing to analyze endpoint data by 2020.> 80% Cognitive technology helps you deliver on their expectations. They expect convenience. Your employees are consumers. + Balance control, deliver on expectations =
  • 6. 6 IBM Security Cognitive technology gives IT and Security leaders the power to see: • What happened • What can happen • What should be done All in the context of your environment.
  • 7. 7 IBM Security Cognitive offers a new approach • Digging through news & blogs randomly • Manually searching in platform DISCOVER • Being alerted with insights & news • Asking questions, getting answers • Spending hours learning DEFINE • Getting knowledge served to you • Fumbling for relevancy & best practices ASSESS • Gaining instant understanding & recommendations • Developing an action plan ACT • Taking immediate action within context GO FROM TO
  • 8. 8 IBM Security IBM MaaS360 with Watson for cognitive UEM Trusted Advisor Augmented intelligence and cognitive computing Actionable insights Contextual analytics Apps and content People and identity Apps Content Data Identity Threats Connectivity Devices and things Smartphones Tablets Laptops Wearables Internet of Things
  • 10. 10 IBM Security • Seamless user experience with SSO to cloud apps from desktop or mobile • Conditional access preventing access from unmanaged or non-compliant devices • Instant on without any installation or infrastructure • Flexible integration supports existing AD and LDAP directories • Bundled with MaaS360 additional licenses not required Enable access management through MaaS360 UEM New SSO to Mobile, Web/SaaS apps Identity Federation Self-Service App Request Onboarding, Provisioning Step-up Authentication, MFA Conditional Access Management Threat and Risk Management IBM Cloud Identity
  • 11. 11 IBM Security Device Authentication (Native Mobile SSO) User launches Application SaaS/Web applications Native Mobile App SSO from a mobile device to enterprise resources via integration with IBM Cloud Identity IBM Cloud Identity Connect SAML SSO
  • 12. 12 IBM Security Managed by MaaS360 Unmanaged APPROVED APPS Provides SSO with conditional access ensuring only trusted devices and applications can access enterprise resources Compliant with IT Policy Access granted SSO to apps Access denied IBM Cloud Identity This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
  • 13. 13 IBM Security Addressing user pains with application access Mobile Apps SaaS Apps EMPLOYEE LINE OF BUSINESS IT SECURITY USER PAINS • Multiple usernames and passwords • Difficult to find applications • No idea how to request access • Current tools aren’t user friendly • Shadow IT costs are expensive • Too much time waiting on IT • Loss of control over data • Infrastructure costs • IT skill dependencies • Loss of security over data • Roadblock for the business • Heritage tools aren’t user friendly
  • 14. 14 IBM Security Plan for Identity Management with IBM Cloud Identity Embedded Cloud Identity extends the MaaS360 platform and provides single sign-on with conditional access to cloud applications Web SaaS App SSO, Identity Federation Mobile Native App SSO, Conditional Access Management (iOS only, Q4 Android) Single touch access to mobile, web/SaaS apps boosts productivity Identity federation using pre-integrated connectors to popular SaaS applications Conditional access ensures only trusted devices, apps access enterprise resources Threat Management powered by x-force exchange provides risk data for apps Stand-alone Identity and Access Management platform with built- in integration with MaaS360 Interoperability with 3rd party Identity Providers allows customers to leverage their existing investments Threat and Risk Management IBM Cloud Identity NOTE: * Identity Management equates to IBM Cloud Identity Essentials and does not include “Verify” (MFA) or the “ISAM Connector”. This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
  • 15. 15 IBM Security Leading macOS management services MaaS360 covers all your macOS management needs Enterprise Features • Easy User Enrollment • Remote Lock, Wipe • Comprehensive macOS management • Full API driven Profile management for Email, VPN, Wi-Fi, Printer, Login window configuration with certificates integration • Enroll using DEP Greater Security • OS Restrictions for Apps, Updates, Media etc. • FileVault provisioning, reporting and protection • Endpoint Security Reporting for Firewall, Antivirus, Encryption • Patch & App Updates macOS Sierra OS X El Capitan Apps • Software Distribution • App Store • Remote Control
  • 16. 16 IBM Security Software Distribution | OS / App Patch Management
  • 17. 17 IBM Security Best in class to manage Windows 10 With MaaS360 and Windows 10, you can manage your smartphones and laptops with all the ease that you have come to associate with MaaS360 Provisioning Windows 10 Devices • Easy device enrollment • Wi-Fi, VPN Configurations • Locate action and more • Out of box enrollment for Windows 10 devices Greater Security • More Passcode configurations • Full Certificates lifecycle Integration • Apps Compliance • Enterprise Data Protection for Documents • Health Attestation • Compliance Rules • Advanced Patch & 3rd party App Updates Apps • Software Distribution • App Store • Remote Control Window 10 Support
  • 18. 18 IBM Security Software Distribution | OS / App Patch Management
  • 20. 20 IBM Security with Watson – cognitive UEM editions Solution Essentials Deluxe Premier Enterprise Device Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ App Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ Patch and Update Management ✔ ✔ ✔ ✔ Identity Management ✔ ✔ ✔ ✔ Advisor ✔ ✔ ✔ ✔ Container App ✔ ✔ ✔ ✔ Mobile Expense Management ✔ ✔ ✔ ✔ Secure Mobile Mail ✔ ✔ ✔ Secure Mobile Chat ✔ ✔ ✔ OS VPN ✔ ✔ Secure Browser ✔ ✔ Gateway for Browser ✔ ✔ Content Management ✔ ✔ Gateway for Documents ✔ ✔ App Security ✔ ✔ Gateway for Apps ✔ ✔ Mobile Document Editor ✔ Mobile Document Sync ✔ Mobile Threat Management ✔ TeamViewer Remote Support O O O O
  • 21. 21 IBM Security App Management Deploy custom enterprise app catalogs Blacklist, whitelist & require apps Administer app volume purchase programs Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows 10 Mobile, Windows 7, Windows 10 & macOS Gain complete visibility of devices, security & network Enforce compliance with real-time & automated actions Essentials Edition – a great first step for cognitive UEM Patch & Update Management Identify & report on missing OS patches Schedule distribution and installation of Windows OS & macOS patches Determine outstanding updates to third party Windows and macOS applications, like Java & Adobe Identity Management Single sign-on & touch access Conditional access to trusted devices Identity federation with apps
  • 22. 22 IBM Security Container App A separate, corporate mobile workplace for iOS, Android & Windows Productivity apps for work in one place Data leak prevention controls to restrict copy-paste & forwarding of content Advisor Boost user productivity by identifying policy and app deployment enhancements Discover security vulnerabilities & emerging threats to endpoints, apps & data Improve IT operational efficiency by applying best practices & learning from industry & peer benchmarks Essentials Edition – a great first step for cognitive UEM Mobile Expense Management Monitor mobile data usage with real-time alerts Set policies to restrict or limit data & voice roaming Review integrated reporting & analytics
  • 23. 23 IBM Security Deluxe Edition – add email and chat containerization includes all solutions from Essentials Edition Secure Mobile Mail Contain emails, attachments & chat to prevent data leakage Enforce authentication, copy/paste & forwarding restrictions FIPS 140-2 compliant, AES-256 bit encryption for data at rest Secure Mobile Chat Enhance on-the-go collaboration and productivity Contain all chat mobile conversations and data Establish quick connections via corporate directory lookup
  • 24. 24 IBM Security Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition Secure Browser A feature-rich web browser for secure access to intranet sites Define URL filters & security policies based on categories Block known malicious websites OS VPN Preserves the native VPN experience for iOS and Android users Leverages the hosted MaaS360 Certificate Authority to issue authentication certs Deployed alongside your corporate VPN solution Gateway for Browser Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web apps & network resources Access seamlessly & securely without needing a VPN session on mobile device
  • 25. 25 IBM Security Gateway for Documents Secure access to internal files: e.g., SharePoint & Windows File Share Retrieve enterprise documents without a VPN session Content Management Contain documents & files to prevent data leakage Enforce authentication, copy/paste & view-only restrictions Access distributed content/repositories: SharePoint, Box, Google Drive & OneDrive App Security Contain enterprise apps with a simple app wrapper or SDK Enforce authentication & copy/paste restrictions Prevent access from compromised devices Gateway for Apps Add per app VPN to Application Security to integrate behind-the- firewall data in private apps Incorporate enterprise data without a device VPN session Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition
  • 26. 26 IBM Security Enterprise Edition – the ultimate package for protection & productivity includes all solutions from Deluxe Edition Mobile Document Sync Synchronize user content across managed devices Restrict copy/paste & opening in unmanaged apps Store content securely, both in the cloud & on devices Mobile Document Editor Create, edit & save content in a secure, encrypted container Collaborate on Word, Excel, PowerPoint & text files Change fonts & insert images, tables, shapes, links & more Mobile Threat Management Detect and analyze mobile malware on compromised devices Automate remediation via near real-time compliance engine Take action on jailbroken/rooted devices over-the-air
  • 27. 27 IBM Security TeamViewer Remote Support for IBM MaaS360 • Connect in seconds to obtain real-world remote device views and perform remote control functions • Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops • Conduct remote device configurations, provisioning, remediation of connectivity issues and more • Reduce the volume of IT help desk calls and emailed requests for device support • Increase productivity for IT administrators and end users
  • 28. 28 IBM Security Next steps Demo Participate in a deep-dive demo with our experts Deploy Start managing and securing your mobile environment Evaluate Set up and configure your custom trial service 1 2 3
  • 29. 29 IBM Security Strong adoption in the enterprise Manufacturing Consumer Public Others Trusted by over 14,000 customers Financial Healthcare
  • 30. 30 IBM Security Complete UEM of mobile devices, laptops & things Best-in-class cloud on a mature, trusted platform Open platform for integration with leading IT systems for actionable insights & cognitive analytics What sets IBM MaaS360 apart Industry-best user interfaces for app catalogs & workplace container Dedicated to your success with 24x7x365 support by chat, phone, email
  • 31. 31 IBM Security Best-in-class cloud delivery model Fast deployment Simple, self-service provisioning process designed for maximum configurability Effortless scalability Trial instantly becomes production environment with ability turn up new devices, users, apps Automatic upgrades Continuously updated daily with new capabilities and same day OS support for the latest platform Cloud expertise Dedicated team supporting a mature platform with unmatched security certifications Agility of the cloud for the pace of change in mobility
  • 32. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity https://www.youtube.com/user/ibmse curitysolutions © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU