SlideShare a Scribd company logo
1 of 21
Download to read offline
www.AKTIO.comwww.AKTIO.com
www.AKTIO.com
Solución de Seguridad en dispositivos
IBM Endpoint Manager
Enrique G. Dutra
Enterprise Security MVP – MCT - IBM Sales Spec.
Auditor Lider ISO/IEC 27001:2005
Punto Net Soluciones SRL
edutra@puntonetsoluciones.com.ar
Tw: @egdutra @linenetsecurity
www.AKTIO.com
AGENDA
• Problemáticas actuales.
• IBM Endpoint Manager.
• Análisis de funcionalidades.
www.AKTIO.com
Problemáticas actuales
www.AKTIO.com
Problemáticas actuales
- Plataformas no están totalmente actualizadas
- Solo se actualizan algunas soluciones.
- No todas las soluciones están actualizadas y
presentan vulnerabilidades.
- Verificación de cumplimientos manuales.
- Poco conocimiento del estado de la plataforma.
- No hay revisión consolidada de las consolas de
las diferentes plataformas de seguridad.
www.AKTIO.com
Problemáticas actuales
- Falta de verificación de compliances.
- Ausencia de seguimiento de uso de
aplicaciones en los dispositivos.(Ej:
licenciamiento)
- Fuga de información.
- El despliegue de software no es homogéneo.
www.AKTIO.com
Quieren compartir algunas problemáticas con
nosotros?
¿Nos alcanza?
www.AKTIO.com
IBM Endpoint Manager 9.2.0
www.AKTIO.com
IBM Endpoint Manager
• Software empresarial para gestionar dispositivos
• Escalable hasta 250.000 dispositivos
• 1 única consola
• 1 solo agente
• 1 o varios retransmisores
• Reportes Web
www.AKTIO.com
Smartphones & Tablets
Mobile
Devices
Mobile
Apps
PC’s, Macs, POS, ATMs
On and off-network
Servers
Physical and Virtual
Patch
Management
Lifecycle
Management
Core
Protection
Security &
Compliance
Power
Management
SW Use
Analysis
Mobile
Management
Server
Automation
SaaS, On-premise, or MSP
Fastest time to compliance
Comprehensive Security
Lowest TCO
Unificación de la administración
www.AKTIO.com
Enterprise Mobility Management Suites Client Management ToolsSecurity Information & Event Management
IBM es el líder en administración de dispositivos
www.AKTIO.com
• Automates and manages continuous security configuration policy
compliance.
• Easily and quickly assess endpoint security posture.
• Automatically patch and remediate non-compliant systems.
• Deploy, Update, and health check 3rd-party Antivirus solutions
• Identify, manage, and report on policy exceptions and deviations.
• Policy based quarantine of non-compliant systems
Library of 8,000+ compliance settings, including support for USGCB, DISA STIG, and CIS
Automatically and continuously enforce policy at the endpoint
• Asset Discovery
• Compliance Analytics
• Patch Management
• Security Configuration Management
• Vulnerability Management
• Multi-Vendor Endpoint Protection Management
IBM Endpoint Manager – Segurity & Compliance
www.AKTIO.com
 Asset Discovery
 Anti-Virus / Anti-
Malware
 Firewall Protection
 File & Web Reputation
 Data Loss Prevention
 Asset discovery and reporting across heterogeneous
operating systems
 Provides anti-malware protection to Mac and Microsoft
Windows endpoints.
 Provides security for both fixed network-connected
endpoints and roaming Internet-connected endpoints.
 The web reputation feature automatically determines the
safety of millions of dynamically rated websites.
 Delivers integrated DLP capabilities using the same
single console and single agent.
Provides near real-time protection from malware & other malicious threats through
capabilities such as file & web reputation, personal firewall and behavior monitoring.
BeneficiosServicios
IBM Endpoint Manager – Core Protection
www.AKTIO.com
For organizations of various business verticals such as healthcare,
finance, manufacturing, retail, services, education and public sector
and of various size from SMB to Fortune 500
IBM Endpoint Manger is:
 Easy to use with simplified patching process,
 Easy to scale from 10 to 250,000 devices and
 Responsive with automation to detect and remediate vulnerabilities
 Extensible to 90+ OS and Windows apps
Who need to:
Assess the state of IT assets (E.g. Inventory),
Deploy OS patches and application updates,
Manage IT compliance and policy enforcement
THE end-to-end software
patch management solution
Coordinate and patch all
systems with one tool
Provides VISIBILITY, AUTOMATION and CONTINUOUS COMPLIANCE across 90+ Operating Systems
IBM Endpoint Manager – Patch Management
www.AKTIO.com
Services
• Asset Discovery
• Patch Management
• Inventory Management
• Software Distribution
• OS Deployment
• Remote Desktop Control
Benefits
• Role based software deployment and user
self-provisioning
• Hardware independent OS imaging and
driver management
• Dramatically reduced patch cycles and
increased first-pass success rates
• Closed loop validation in real time
• Multi-platform support from a single
console (Unix, Linux, Windows, Mac OS X)
Dramatically
reduced patch
cycles and
increased first-
pass success rates
Multi-platform
support (Unix,
Linux, Windows,
Mac OS X)
Discover, Control, and Automate with a single integrated solution
IBM provides a comprehensive set of content out of the box, ready to deploy.
The IEM Platform is flexible and powerful when it comes to custom content and ad-hoc policy creation.
Patch Management
• Easily and quietly deploy patches
across Windows, Mac OS X, Linux, Unix
• Enable advanced policies that
automatically reapply patches if they are
removed
IBM
Provided
Content
Custom
Content
Software Distribution
• Cross-platform management of
software packages
• Web based self-service portal,
provides as-needed enablement to
end users
OS Deployment
• Solves bare metal and migration
scenarios
• Easily combine with patch activities
to create “true-up” baselines post-
install
Asset Discovery SW & HW Inventory Remote Control
Community Ecosystem
• Take advantage of a growing library of custom
Fixlets created by the user community
Ad-Hoc Tasks
• Respond quickly to new challenges by making simple
modifications to any of the 100,000+ Fixlets IBM provides
IBM Endpoint Manager – Lifecycle Management
www.AKTIO.com
Granular power tracking to allow breakdown of weekly
power consumption and idle time
Historical web reports to reflect the weekly power tracking
data
Power profile wizard to allow creation of 'multiple power
profile policy‘
Client side dashboard to show the projected impact of
applying a single power profile offer
BES Server Plug-in Service enhanced to use encrypted
passwords
Benefits
IBM Endpoint Manager – Power Management
www.AKTIO.com
• For Windows Servers and PCs
• Unix/Linux Servers
• Software Asset Discovery
• Software Use Metering
• Software Use Reporting
• Software identification catalogue,
which contains over 105,000
signatures out of the box and
updates are released regularly
• Easily customize the software
identification catalogue to include
tracking of home-grown and
proprietary applications
Software publishers
8000+
Software products
40,000+
Services
• Centralized visibility &
reporting of all sw assets
• Assess software
inventory to help
identify what is deployed
in readiness for software
audits
• Meters software usage
to identify unused
software
• Reports software usage
and deployments to help
measure compliance
Benefits
IBM Endpoint Manager – Software use Analysis
www.AKTIO.com
DEMO
www.AKTIO.com
Resumiendo IBM Endpoint Manager
Mobile
Devices
Security &
Compliance
Patch
Management
Lifecycle
Management
Power
Management
Core
Protection
Software Use
Analysis
Middleware Management
Physical & Virtual
Server Management
Advanced Server
Management & Task
Automation
Server
Automation
(add-on)
Software
Distribution
OS Deployment
Remote Control
Patch
Management
Basic HW & SW
Inventory
Vulnerability
Assessment
Compliance
Analytics
3rd Party Endpoint
Protection Mgmnt
Patch
Management
Security Config
Mgmnt
Anti-Malware
Firewall
Data Loss Prevention &
Device Control
(Data Protection add-on)
Available as
“Starter Kit”
Software
Catalog
Correlation
Software
Usage
Reporting
Software
Inventory
Offline
Patching
Application
Patching
OS Patching
Compliance
App Mgmt
Mobile
Device
Mgmt
TPM
evolution
TADd / ILMT
convergence
Available as
“Starter Kit”
Self-Quarantine
Windows &
Macs
Carbon, cost
reduction reports
End-user
Dashboard
Datacenters
OS & App
Patching
Software
Distribution
OS Deployment
Remote Control
Basic HW & SW
Inventory
Vulnerability
Assessment
Compliance
Analytics
3rd Party Endpoint
Protection Mgmnt
Security Config
Mgmnt
Self-Quarantine
www.AKTIO.com
Mantenerse actualizado
IBM Punto Net Soluciones
@IBMSecurity @Linenetsecurity
@egdutra
/secintelligence /PuntoNetSolucionesSRL
/line.net.71
http://seguridadit.blogspot.com.ar/
http://www-03.ibm.com/software/products/en/appscan-standard
www.AKTIO.com
Muchas Gracias
Muito Obrigado
Thank You

More Related Content

What's hot

IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Keeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the EnterpriseKeeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the EnterpriseParallels Inc
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...eG Innovations
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoNCCOMMS
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?ManageEngine
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i SecurityPrecisely
 

What's hot (20)

IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
Why choose genetec
Why choose genetecWhy choose genetec
Why choose genetec
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Keeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the EnterpriseKeeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the Enterprise
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Knox Manage Tech Sheet
Knox Manage Tech SheetKnox Manage Tech Sheet
Knox Manage Tech Sheet
 
BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
How to Extend SCOM to Achieve Single-Pane-of-Glass Monitoring into Your Micro...
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
Knox Manage Sales Brochure
Knox Manage Sales BrochureKnox Manage Sales Brochure
Knox Manage Sales Brochure
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
 

Similar to Manage devices and security with IBM Endpoint Manager

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfssusera181ef
 
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1ITCamp
 
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...eG Innovations
 
Verixo management Suite 2014
Verixo management Suite 2014Verixo management Suite 2014
Verixo management Suite 2014Sandeep Gandhi
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfDNUG e.V.
 
Monitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOMMonitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOMeG Innovations
 
1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptxnguyenthanhdatpl403
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxTriLe786508
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...IBM Sverige
 
DACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDNUG e.V.
 

Similar to Manage devices and security with IBM Endpoint Manager (20)

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdf
 
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1
ITCamp 2013 - Adrian Stoian - Whats new in ConfigMgr 2012 SP1
 
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
The "One Monitor": Tranform MS SCOM into an End-to-End Monitoring & Diagnosis...
 
Verixo management Suite 2014
Verixo management Suite 2014Verixo management Suite 2014
Verixo management Suite 2014
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
 
Monitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOMMonitor & Manage Citrix App Performance Using Microsoft SCOM
Monitor & Manage Citrix App Performance Using Microsoft SCOM
 
1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx1E_ITPF203333333333333333314_Bigfix.pptx
1E_ITPF203333333333333333314_Bigfix.pptx
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptx
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...
Tivoli Live – Nyckelfärdig molntjänst för dina behov inom Service Desk and Mo...
 
DACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdfDACHNUG50 HCL BigFix_Keynote.pdf
DACHNUG50 HCL BigFix_Keynote.pdf
 

More from Enrique Gustavo Dutra

[Pt br] - 36751 - mitre att&ck - azure
[Pt br] - 36751 - mitre att&ck - azure[Pt br] - 36751 - mitre att&ck - azure
[Pt br] - 36751 - mitre att&ck - azureEnrique Gustavo Dutra
 
Analisis Aplicaciones Moviles con OWASP
Analisis Aplicaciones Moviles con OWASPAnalisis Aplicaciones Moviles con OWASP
Analisis Aplicaciones Moviles con OWASPEnrique Gustavo Dutra
 
Presentacion de Seguridad - MVP Conf 2019
Presentacion de Seguridad - MVP Conf 2019Presentacion de Seguridad - MVP Conf 2019
Presentacion de Seguridad - MVP Conf 2019Enrique Gustavo Dutra
 
201705 v1 hack_paraloschicos_ransom [autoguardado]
201705 v1 hack_paraloschicos_ransom [autoguardado]201705 v1 hack_paraloschicos_ransom [autoguardado]
201705 v1 hack_paraloschicos_ransom [autoguardado]Enrique Gustavo Dutra
 
Como proteger la empresa de Ransomware
Como proteger la empresa de RansomwareComo proteger la empresa de Ransomware
Como proteger la empresa de RansomwareEnrique Gustavo Dutra
 
Implementación Segura en red de MS Windows 10.1
Implementación Segura en red de MS Windows 10.1Implementación Segura en red de MS Windows 10.1
Implementación Segura en red de MS Windows 10.1Enrique Gustavo Dutra
 
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013Enrique Gustavo Dutra
 
1 Hack Para los Chicos - 2016 - Presentación
1 Hack Para los Chicos - 2016 - Presentación1 Hack Para los Chicos - 2016 - Presentación
1 Hack Para los Chicos - 2016 - PresentaciónEnrique Gustavo Dutra
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBM
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBMPresentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBM
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBMEnrique Gustavo Dutra
 

More from Enrique Gustavo Dutra (13)

WAF de AZURE
WAF de AZUREWAF de AZURE
WAF de AZURE
 
[Pt br] - 36751 - mitre att&ck - azure
[Pt br] - 36751 - mitre att&ck - azure[Pt br] - 36751 - mitre att&ck - azure
[Pt br] - 36751 - mitre att&ck - azure
 
Hacking applications that use IoT
Hacking applications that use IoT Hacking applications that use IoT
Hacking applications that use IoT
 
Analisis Aplicaciones Moviles con OWASP
Analisis Aplicaciones Moviles con OWASPAnalisis Aplicaciones Moviles con OWASP
Analisis Aplicaciones Moviles con OWASP
 
2020 enero Argentesting
2020 enero Argentesting2020 enero Argentesting
2020 enero Argentesting
 
Presentacion de Seguridad - MVP Conf 2019
Presentacion de Seguridad - MVP Conf 2019Presentacion de Seguridad - MVP Conf 2019
Presentacion de Seguridad - MVP Conf 2019
 
Presentacion de NETConf.UY 2018
Presentacion de NETConf.UY 2018Presentacion de NETConf.UY 2018
Presentacion de NETConf.UY 2018
 
201705 v1 hack_paraloschicos_ransom [autoguardado]
201705 v1 hack_paraloschicos_ransom [autoguardado]201705 v1 hack_paraloschicos_ransom [autoguardado]
201705 v1 hack_paraloschicos_ransom [autoguardado]
 
Como proteger la empresa de Ransomware
Como proteger la empresa de RansomwareComo proteger la empresa de Ransomware
Como proteger la empresa de Ransomware
 
Implementación Segura en red de MS Windows 10.1
Implementación Segura en red de MS Windows 10.1Implementación Segura en red de MS Windows 10.1
Implementación Segura en red de MS Windows 10.1
 
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013
Capacitacion sobre Desarrollo Seguro - SDL / OWASP 2013
 
1 Hack Para los Chicos - 2016 - Presentación
1 Hack Para los Chicos - 2016 - Presentación1 Hack Para los Chicos - 2016 - Presentación
1 Hack Para los Chicos - 2016 - Presentación
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBM
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBMPresentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBM
Presentacion IBM AKTIO Punto Net Soluciones SRL - APPSCAN IBM
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Manage devices and security with IBM Endpoint Manager

  • 2. www.AKTIO.com Solución de Seguridad en dispositivos IBM Endpoint Manager Enrique G. Dutra Enterprise Security MVP – MCT - IBM Sales Spec. Auditor Lider ISO/IEC 27001:2005 Punto Net Soluciones SRL edutra@puntonetsoluciones.com.ar Tw: @egdutra @linenetsecurity
  • 3. www.AKTIO.com AGENDA • Problemáticas actuales. • IBM Endpoint Manager. • Análisis de funcionalidades.
  • 5. www.AKTIO.com Problemáticas actuales - Plataformas no están totalmente actualizadas - Solo se actualizan algunas soluciones. - No todas las soluciones están actualizadas y presentan vulnerabilidades. - Verificación de cumplimientos manuales. - Poco conocimiento del estado de la plataforma. - No hay revisión consolidada de las consolas de las diferentes plataformas de seguridad.
  • 6. www.AKTIO.com Problemáticas actuales - Falta de verificación de compliances. - Ausencia de seguimiento de uso de aplicaciones en los dispositivos.(Ej: licenciamiento) - Fuga de información. - El despliegue de software no es homogéneo.
  • 7. www.AKTIO.com Quieren compartir algunas problemáticas con nosotros? ¿Nos alcanza?
  • 9. www.AKTIO.com IBM Endpoint Manager • Software empresarial para gestionar dispositivos • Escalable hasta 250.000 dispositivos • 1 única consola • 1 solo agente • 1 o varios retransmisores • Reportes Web
  • 10. www.AKTIO.com Smartphones & Tablets Mobile Devices Mobile Apps PC’s, Macs, POS, ATMs On and off-network Servers Physical and Virtual Patch Management Lifecycle Management Core Protection Security & Compliance Power Management SW Use Analysis Mobile Management Server Automation SaaS, On-premise, or MSP Fastest time to compliance Comprehensive Security Lowest TCO Unificación de la administración
  • 11. www.AKTIO.com Enterprise Mobility Management Suites Client Management ToolsSecurity Information & Event Management IBM es el líder en administración de dispositivos
  • 12. www.AKTIO.com • Automates and manages continuous security configuration policy compliance. • Easily and quickly assess endpoint security posture. • Automatically patch and remediate non-compliant systems. • Deploy, Update, and health check 3rd-party Antivirus solutions • Identify, manage, and report on policy exceptions and deviations. • Policy based quarantine of non-compliant systems Library of 8,000+ compliance settings, including support for USGCB, DISA STIG, and CIS Automatically and continuously enforce policy at the endpoint • Asset Discovery • Compliance Analytics • Patch Management • Security Configuration Management • Vulnerability Management • Multi-Vendor Endpoint Protection Management IBM Endpoint Manager – Segurity & Compliance
  • 13. www.AKTIO.com  Asset Discovery  Anti-Virus / Anti- Malware  Firewall Protection  File & Web Reputation  Data Loss Prevention  Asset discovery and reporting across heterogeneous operating systems  Provides anti-malware protection to Mac and Microsoft Windows endpoints.  Provides security for both fixed network-connected endpoints and roaming Internet-connected endpoints.  The web reputation feature automatically determines the safety of millions of dynamically rated websites.  Delivers integrated DLP capabilities using the same single console and single agent. Provides near real-time protection from malware & other malicious threats through capabilities such as file & web reputation, personal firewall and behavior monitoring. BeneficiosServicios IBM Endpoint Manager – Core Protection
  • 14. www.AKTIO.com For organizations of various business verticals such as healthcare, finance, manufacturing, retail, services, education and public sector and of various size from SMB to Fortune 500 IBM Endpoint Manger is:  Easy to use with simplified patching process,  Easy to scale from 10 to 250,000 devices and  Responsive with automation to detect and remediate vulnerabilities  Extensible to 90+ OS and Windows apps Who need to: Assess the state of IT assets (E.g. Inventory), Deploy OS patches and application updates, Manage IT compliance and policy enforcement THE end-to-end software patch management solution Coordinate and patch all systems with one tool Provides VISIBILITY, AUTOMATION and CONTINUOUS COMPLIANCE across 90+ Operating Systems IBM Endpoint Manager – Patch Management
  • 15. www.AKTIO.com Services • Asset Discovery • Patch Management • Inventory Management • Software Distribution • OS Deployment • Remote Desktop Control Benefits • Role based software deployment and user self-provisioning • Hardware independent OS imaging and driver management • Dramatically reduced patch cycles and increased first-pass success rates • Closed loop validation in real time • Multi-platform support from a single console (Unix, Linux, Windows, Mac OS X) Dramatically reduced patch cycles and increased first- pass success rates Multi-platform support (Unix, Linux, Windows, Mac OS X) Discover, Control, and Automate with a single integrated solution IBM provides a comprehensive set of content out of the box, ready to deploy. The IEM Platform is flexible and powerful when it comes to custom content and ad-hoc policy creation. Patch Management • Easily and quietly deploy patches across Windows, Mac OS X, Linux, Unix • Enable advanced policies that automatically reapply patches if they are removed IBM Provided Content Custom Content Software Distribution • Cross-platform management of software packages • Web based self-service portal, provides as-needed enablement to end users OS Deployment • Solves bare metal and migration scenarios • Easily combine with patch activities to create “true-up” baselines post- install Asset Discovery SW & HW Inventory Remote Control Community Ecosystem • Take advantage of a growing library of custom Fixlets created by the user community Ad-Hoc Tasks • Respond quickly to new challenges by making simple modifications to any of the 100,000+ Fixlets IBM provides IBM Endpoint Manager – Lifecycle Management
  • 16. www.AKTIO.com Granular power tracking to allow breakdown of weekly power consumption and idle time Historical web reports to reflect the weekly power tracking data Power profile wizard to allow creation of 'multiple power profile policy‘ Client side dashboard to show the projected impact of applying a single power profile offer BES Server Plug-in Service enhanced to use encrypted passwords Benefits IBM Endpoint Manager – Power Management
  • 17. www.AKTIO.com • For Windows Servers and PCs • Unix/Linux Servers • Software Asset Discovery • Software Use Metering • Software Use Reporting • Software identification catalogue, which contains over 105,000 signatures out of the box and updates are released regularly • Easily customize the software identification catalogue to include tracking of home-grown and proprietary applications Software publishers 8000+ Software products 40,000+ Services • Centralized visibility & reporting of all sw assets • Assess software inventory to help identify what is deployed in readiness for software audits • Meters software usage to identify unused software • Reports software usage and deployments to help measure compliance Benefits IBM Endpoint Manager – Software use Analysis
  • 19. www.AKTIO.com Resumiendo IBM Endpoint Manager Mobile Devices Security & Compliance Patch Management Lifecycle Management Power Management Core Protection Software Use Analysis Middleware Management Physical & Virtual Server Management Advanced Server Management & Task Automation Server Automation (add-on) Software Distribution OS Deployment Remote Control Patch Management Basic HW & SW Inventory Vulnerability Assessment Compliance Analytics 3rd Party Endpoint Protection Mgmnt Patch Management Security Config Mgmnt Anti-Malware Firewall Data Loss Prevention & Device Control (Data Protection add-on) Available as “Starter Kit” Software Catalog Correlation Software Usage Reporting Software Inventory Offline Patching Application Patching OS Patching Compliance App Mgmt Mobile Device Mgmt TPM evolution TADd / ILMT convergence Available as “Starter Kit” Self-Quarantine Windows & Macs Carbon, cost reduction reports End-user Dashboard Datacenters OS & App Patching Software Distribution OS Deployment Remote Control Basic HW & SW Inventory Vulnerability Assessment Compliance Analytics 3rd Party Endpoint Protection Mgmnt Security Config Mgmnt Self-Quarantine
  • 20. www.AKTIO.com Mantenerse actualizado IBM Punto Net Soluciones @IBMSecurity @Linenetsecurity @egdutra /secintelligence /PuntoNetSolucionesSRL /line.net.71 http://seguridadit.blogspot.com.ar/ http://www-03.ibm.com/software/products/en/appscan-standard