SlideShare a Scribd company logo
© 2015 IBM Corporation
Enhance Employee Productivity and Safeguard
Against Mobile Threats
Kaushik Srinivas
Product Manager, IBM MobileFirst Protect
Eric Geller
Security Architect, IBM Security
11/4/2015
IBM Security QRadar Integration with
IBM MobileFirst Protect (MaaS360)
2© 2015 IBM Corporation
 Duration – 60 minutes
 Submit your questions to all panelists in the Q&A
box located in the bottom right corner of your
screen
 Recording and slides will be emailed to you
Housekeeping items
3© 2015 IBM Corporation
 Today’s landscape and the IBM mobile security framework
 Overview
– IBM QRadar
– IBM MobileFirst Protect
– Integration of QRadar + MobileFirst Protect
 Demo: QRadar + MobileFirst Protect
 Summary
 Q&A
Agenda
4© 2015 IBM Corporation
Today’s challenges
Keeping external and internal mobile threats on the radar
Enterprise Resource Access
Broad range of devices and applications
interfacing with or attempting to connect
to corporate network
Mobile Threats
Compromised, jailbroken/rooted
devices, and those afflicted with
malware introducing threats and
compromising enterprise data
Security & Productivity
IT departments hard-pressed to
secure enterprise data and
maintain regulatory compliance
while keeping workers productive
5© 2015 IBM Corporation
387new threats
every minute or more
than six every second
McAfee
As mobile grows, so do security threats
“With the growing penetration of mobile devices in the enterprise, security testing
and protection of mobile applications and data become mandatory.”
Gartner
“Enterprise mobility… new systems of engagement.
These new systems help firms empower their customers, partners,
and employees with context-aware apps and smart products.”
Forrester
Arxan
Top mobile devices
and apps hacked 97%Android
87%iOS
6© 2015 IBM Corporation
The IBM mobile security framework
CA, Oracle, RSA
Configure devices &
manage security policies
Automate enforcement
Mitigate risks of lost or
compromised devices
Distribute & manage
enterprise apps
Separate work &
personal data
Protect apps & data
from vulnerabilities
Enable work content
availability & sharing
Create & edit content
Contain sensitive
corporate information
Provide secure web &
mobile access control
Deliver ease-of-use with
SSO & unified identity
management
Extend Security Intelligence
Extend security information & event management (SIEM) to mobile environment
Incorporate log management, anomaly detection, configuration & vulnerability management
Manage Access
and Fraud
Secure Content
and Collaboration
Safeguard
Applications and Data
Protect
Devices
© 2015 IBM Corporation
IBM Security QRadar
8© 2015 IBM Corporation
IBM Security QRadar
Providing actionable intelligence
IBM QRadar
Security Intelligence
Platform
AUTOMATED
Driving simplicity and
accelerating time-to-value
INTEGRATED
Unified architecture
delivered in a single console
INTELLIGENT
Correlation, analysis and
massive data reduction
9© 2015 IBM Corporation
• Provides near real-time visibility for threat detection and prioritization
• Reduces and prioritizes alerts to focus investigations on an actionable list of suspected incidents
• Enables more effective threat management while producing detailed data access & user activity reports
• Produces detailed data access and user activity reports to help manage compliance
IBM Security QRadar
Security Intelligence to protect assets and information from advanced threats
Servers and mainframes
Data activity
Network and virtual activity
Application activity
Configuration information
Security devices
Users and identities
Vulnerabilities and threats
Global threat intelligence
Automated
Offense
Identification
• Unlimited data collection,
storage and analysis
• Built in data classification
• Automatic asset, service and
user discovery and profiling
• Real-time correlation
and threat intelligence
• Activity baselining
and anomaly detection
• Detects incidents
of the box
Embedded
Intelligence
Prioritized Incidents
Mobile data
Suspected
Incidents
10© 2015 IBM Corporation
IBM zSecure IBM Security AppScan
IBM MobileFirst Protect
IBM Security
Access Manager
IBM Security Privileged
Identity Manager
IBM InfoSphere
Guardium
IBM Security
Identity Manager
IBM Security Directory
Server and Integrator
IBM Endpoint Manager
IBM Trusteer Apex
IBM QRadar is the centerpiece of IBM security integration
IBM QRadar
Security Intelligence
Platform
© 2015 IBM Corporation
IBM MobileFirst Protect
12© 2015 IBM Corporation
IBM MobileFirst Protect
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
Complete mobility management and security
13© 2015 IBM Corporation
IBM MobileFirst Protect
Secure PIM
App Security &
Management
File Sync,
Edit & Share
Secure
Browser
Trusted Workplace
Separates work &
personal data with
anytime access to
corporate resources
Works across iOS,
Android, & Windows
Phone platforms with a
native user experience
Supports Box,
Microsoft, Google,
IBM & other
collaboration tools,
apps & containers
Unleash end-user productivity
14© 2015 IBM Corporation
IBM Security QRadar integration with IBM MobileFirst Protect
 Continuous Mobile Visibility
– Detect when smartphones and tablets are attempting to connect to the network
– Monitor enrollment of personally owned and corporate-liable devices
– Gain awareness of unauthorized devices
– Learn when users install blacklisted apps and access restricted websites
 Compromised Device Remediation
– Uncover devices infected with malware before they compromise your enterprise data
– Identify jailbroken iOS devices and rooted Android devices
– Set security policies and compliance rules to automate remediation
– Block access, or perform a selective wipe or full wipe of compromised devices
View MobileFirst Protect compliance rule violations through QRadar
15© 2015 IBM Corporation
Simple, yet powerful, addition to QRadar
Single pane of glass view on QRadar, with data feeds
from MobileFirst Protect
16© 2015 IBM Corporation
Mobile log activity in QRadar
Mobile log activity as viewed directly from QRadar console
 MobileFirst Protect alerts, events and information
 Displays type of violation, time of occurrence and threat severity
17© 2015 IBM Corporation
Event detail of mobile activity in QRadar
System administrator view of specific mobile compliance violation via QRadar portal
 Displays context surrounding threat severity
 Aids in prioritization of response between violations
18© 2015 IBM Corporation
Question:
Of the following mobile device threat categories, which does your
organization classify as most severe?
Answers:
A. Malware infected devices
B. Jailbroken (iOS) or Rooted (Android) devices
C. Lost/Stolen devices
D. Personally-owned/BYOD devices
E. Outdated OS Versions
Poll Question #1
© 2015 IBM Corporation
Live demonstration
20© 2015 IBM Corporation
Summary
Continuous visibility into mobile threats and events
 End-to-end risk protection and analysis provided by IBM Mobile Security solutions
 Ongoing mobile event detection displayed from a single pane of glass
 Access to detailed, customizable reports on events and user activity
 Option to drill down to individual events to evaluate the severity of threats
IBM QRadar
Security
Intelligence
Platform
IBM MobileFirst
Protect
© 2015 IBM Corporation
Getting started
22© 2015 IBM Corporation
Get started with IBM MobileFirst Protect now
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices, apps
and content
Easy
Set up and
configure your
service in minutes
1 2 3
23© 2015 IBM Corporation
Integrate IBM MobileFirst Protect with IBM QRadar
1. If automatic updates are not enabled, download the following RPMs:
• DSMCommon
• IBM Fiberlink REST API Protocol
• IBM Fiberlink MaaS360
2. Configure your MobileFirst Protect instance to enable communication
with QRadar
3. Create a MobileFirst Protect log source on the QRadar console
Additional details: http://ibm.co/1Sdmc3C
24© 2015 IBM Corporation
Question:
Would you like more information?
Answers:
A. Yes, please send me more information on IBM Security QRadar
B. Yes, please send me more information on IBM MobileFirst Protect
C. Yes, please send me more information on both QRadar and
MobileFirst Protect
D. No, not at this time
Poll Question #2
© 2015 IBM Corporation
Questions?
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security
© 2015 IBM Corporation
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available
sources. IBM has not tested those products in connection with this publication
and cannot confirm the accuracy of performance, compatibility or any other
claims related to non-IBM products. Questions on the capabilities of non-IBM
products should be addressed to the suppliers of those products. IBM does not
warrant the quality of any third-party products, or the ability of any such third-
party products to interoperate with IBM’s products. IBM EXPRESSLY
DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does
not, grant any right or license under any IBM patents, copyrights, trademarks or
other intellectual property right.
Other company, product, or service names may be trademarks or service
marks of others. A current list of IBM trademarks is available at “Copyright and
trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2015 by International Business Machines Corporation (IBM). No
part of this document may be reproduced or transmitted in any form without
written permission from IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure
restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products
that have not yet been announced by IBM) has been reviewed for accuracy as
of the date of initial publication and could include unintentional technical or
typographical errors. IBM shall have no responsibility to update this information.
THIS document is distributed "AS IS" without any warranty, either express or
implied. In no event shall IBM be liable for any damage arising from the use of
this information, including but not limited to, loss of data, business interruption,
loss of profit or loss of opportunity.
IBM products and services are warranted according to the terms and conditions
of the agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are
subject to change or withdrawal without notice. Performance data contained
herein was generally obtained in a controlled, isolated environments. Customer
examples are presented as illustrations of how those customers have used IBM
products and the results they may have achieved. Actual performance, cost,
savings or other results in other operating environments may vary. References
in this document to IBM products, programs, or services does not imply that
IBM intends to make such products, programs or services available in all
countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by
independent session speakers, and do not necessarily reflect the views of IBM.
All materials and discussions are provided for informational purposes only, and
are neither intended to, nor shall constitute legal or other guidance or advice to
any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal
requirements and to obtain advice of competent legal counsel as to the
identification and interpretation of any relevant laws and regulatory
requirements that may affect the customer’s business and any actions the
customer may need to take to comply with such laws. IBM does not provide
legal advice or represent or warrant that its services or products will ensure that
the customer is in compliance with any law.
Legal notices and disclaimers

More Related Content

What's hot

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
Sylvia Low
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
Killian Delaney
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Summit 7 Systems
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
Neil Kemp
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
IBM Security
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
IBM Thailand Co Ltd
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
Francisco González Jiménez
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Ron Favali
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
Sybase Türkiye
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
IBM Security
 

What's hot (20)

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 

Viewers also liked

La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
Alfonso Mallia
 
พ.อ.ดร.เศรษฐพงค์ 4 G impact
พ.อ.ดร.เศรษฐพงค์   4 G impactพ.อ.ดร.เศรษฐพงค์   4 G impact
พ.อ.ดร.เศรษฐพงค์ 4 G impact
Settapong-Broadband
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
AGILLY
 
Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Mohammad Mahin Khan
 
Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Robert McCray
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
EUBrasilCloudFORUM .
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
AGILLY
 
New historicism
New historicismNew historicism
New historicism
umabagohil
 
FinTech: Digital Innovation in the Financial Industry
FinTech: Digital Innovation in the Financial IndustryFinTech: Digital Innovation in the Financial Industry
FinTech: Digital Innovation in the Financial Industry
Jean-Michel Pailhon
 
Post Structuralism
Post StructuralismPost Structuralism
Post Structuralism
drashtimehtab01011993
 
Alterntative med
Alterntative medAlterntative med
Alterntative med
dursitarosales
 
Material para Quinto Grado | Material para Imprimir
Material para Quinto Grado | Material para Imprimir Material para Quinto Grado | Material para Imprimir
Material para Quinto Grado | Material para Imprimir
Editorial MD
 
Actividades para Cuarto Grado de Primaria para Imprimir.
Actividades para Cuarto Grado de Primaria para Imprimir.Actividades para Cuarto Grado de Primaria para Imprimir.
Actividades para Cuarto Grado de Primaria para Imprimir.
Editorial MD
 

Viewers also liked (14)

La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
 
พ.อ.ดร.เศรษฐพงค์ 4 G impact
พ.อ.ดร.เศรษฐพงค์   4 G impactพ.อ.ดร.เศรษฐพงค์   4 G impact
พ.อ.ดร.เศรษฐพงค์ 4 G impact
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
Kishor CV Ultra
Kishor CV UltraKishor CV Ultra
Kishor CV Ultra
 
Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...
 
Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Resume R_McCray FEB 2016
Resume R_McCray FEB 2016
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
 
New historicism
New historicismNew historicism
New historicism
 
FinTech: Digital Innovation in the Financial Industry
FinTech: Digital Innovation in the Financial IndustryFinTech: Digital Innovation in the Financial Industry
FinTech: Digital Innovation in the Financial Industry
 
Post Structuralism
Post StructuralismPost Structuralism
Post Structuralism
 
Alterntative med
Alterntative medAlterntative med
Alterntative med
 
Material para Quinto Grado | Material para Imprimir
Material para Quinto Grado | Material para Imprimir Material para Quinto Grado | Material para Imprimir
Material para Quinto Grado | Material para Imprimir
 
Actividades para Cuarto Grado de Primaria para Imprimir.
Actividades para Cuarto Grado de Primaria para Imprimir.Actividades para Cuarto Grado de Primaria para Imprimir.
Actividades para Cuarto Grado de Primaria para Imprimir.
 

Similar to Améliorer la productivité des employés et se protéger contre les menaces mobiles

2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
AGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
AGILLY
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
AGILLY
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
Killian Delaney
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
Camilo Fandiño Gómez
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
IBM Security
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
ArumIm
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
BuyOnCloud Software Service (P) Ltd.
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
Morten Bjørklund
 
IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
Shwetank Jayaswal
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 

Similar to Améliorer la productivité des employés et se protéger contre les menaces mobiles (20)

2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 

More from AGILLY

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
AGILLY
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
AGILLY
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
AGILLY
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
AGILLY
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
AGILLY
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
AGILLY
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
AGILLY
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
AGILLY
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
AGILLY
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
AGILLY
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
AGILLY
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
AGILLY
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
AGILLY
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
AGILLY
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrement
AGILLY
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
AGILLY
 

More from AGILLY (20)

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrement
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 

Recently uploaded

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 

Recently uploaded (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 

Améliorer la productivité des employés et se protéger contre les menaces mobiles

  • 1. © 2015 IBM Corporation Enhance Employee Productivity and Safeguard Against Mobile Threats Kaushik Srinivas Product Manager, IBM MobileFirst Protect Eric Geller Security Architect, IBM Security 11/4/2015 IBM Security QRadar Integration with IBM MobileFirst Protect (MaaS360)
  • 2. 2© 2015 IBM Corporation  Duration – 60 minutes  Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen  Recording and slides will be emailed to you Housekeeping items
  • 3. 3© 2015 IBM Corporation  Today’s landscape and the IBM mobile security framework  Overview – IBM QRadar – IBM MobileFirst Protect – Integration of QRadar + MobileFirst Protect  Demo: QRadar + MobileFirst Protect  Summary  Q&A Agenda
  • 4. 4© 2015 IBM Corporation Today’s challenges Keeping external and internal mobile threats on the radar Enterprise Resource Access Broad range of devices and applications interfacing with or attempting to connect to corporate network Mobile Threats Compromised, jailbroken/rooted devices, and those afflicted with malware introducing threats and compromising enterprise data Security & Productivity IT departments hard-pressed to secure enterprise data and maintain regulatory compliance while keeping workers productive
  • 5. 5© 2015 IBM Corporation 387new threats every minute or more than six every second McAfee As mobile grows, so do security threats “With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory.” Gartner “Enterprise mobility… new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.” Forrester Arxan Top mobile devices and apps hacked 97%Android 87%iOS
  • 6. 6© 2015 IBM Corporation The IBM mobile security framework CA, Oracle, RSA Configure devices & manage security policies Automate enforcement Mitigate risks of lost or compromised devices Distribute & manage enterprise apps Separate work & personal data Protect apps & data from vulnerabilities Enable work content availability & sharing Create & edit content Contain sensitive corporate information Provide secure web & mobile access control Deliver ease-of-use with SSO & unified identity management Extend Security Intelligence Extend security information & event management (SIEM) to mobile environment Incorporate log management, anomaly detection, configuration & vulnerability management Manage Access and Fraud Secure Content and Collaboration Safeguard Applications and Data Protect Devices
  • 7. © 2015 IBM Corporation IBM Security QRadar
  • 8. 8© 2015 IBM Corporation IBM Security QRadar Providing actionable intelligence IBM QRadar Security Intelligence Platform AUTOMATED Driving simplicity and accelerating time-to-value INTEGRATED Unified architecture delivered in a single console INTELLIGENT Correlation, analysis and massive data reduction
  • 9. 9© 2015 IBM Corporation • Provides near real-time visibility for threat detection and prioritization • Reduces and prioritizes alerts to focus investigations on an actionable list of suspected incidents • Enables more effective threat management while producing detailed data access & user activity reports • Produces detailed data access and user activity reports to help manage compliance IBM Security QRadar Security Intelligence to protect assets and information from advanced threats Servers and mainframes Data activity Network and virtual activity Application activity Configuration information Security devices Users and identities Vulnerabilities and threats Global threat intelligence Automated Offense Identification • Unlimited data collection, storage and analysis • Built in data classification • Automatic asset, service and user discovery and profiling • Real-time correlation and threat intelligence • Activity baselining and anomaly detection • Detects incidents of the box Embedded Intelligence Prioritized Incidents Mobile data Suspected Incidents
  • 10. 10© 2015 IBM Corporation IBM zSecure IBM Security AppScan IBM MobileFirst Protect IBM Security Access Manager IBM Security Privileged Identity Manager IBM InfoSphere Guardium IBM Security Identity Manager IBM Security Directory Server and Integrator IBM Endpoint Manager IBM Trusteer Apex IBM QRadar is the centerpiece of IBM security integration IBM QRadar Security Intelligence Platform
  • 11. © 2015 IBM Corporation IBM MobileFirst Protect
  • 12. 12© 2015 IBM Corporation IBM MobileFirst Protect Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access Complete mobility management and security
  • 13. 13© 2015 IBM Corporation IBM MobileFirst Protect Secure PIM App Security & Management File Sync, Edit & Share Secure Browser Trusted Workplace Separates work & personal data with anytime access to corporate resources Works across iOS, Android, & Windows Phone platforms with a native user experience Supports Box, Microsoft, Google, IBM & other collaboration tools, apps & containers Unleash end-user productivity
  • 14. 14© 2015 IBM Corporation IBM Security QRadar integration with IBM MobileFirst Protect  Continuous Mobile Visibility – Detect when smartphones and tablets are attempting to connect to the network – Monitor enrollment of personally owned and corporate-liable devices – Gain awareness of unauthorized devices – Learn when users install blacklisted apps and access restricted websites  Compromised Device Remediation – Uncover devices infected with malware before they compromise your enterprise data – Identify jailbroken iOS devices and rooted Android devices – Set security policies and compliance rules to automate remediation – Block access, or perform a selective wipe or full wipe of compromised devices View MobileFirst Protect compliance rule violations through QRadar
  • 15. 15© 2015 IBM Corporation Simple, yet powerful, addition to QRadar Single pane of glass view on QRadar, with data feeds from MobileFirst Protect
  • 16. 16© 2015 IBM Corporation Mobile log activity in QRadar Mobile log activity as viewed directly from QRadar console  MobileFirst Protect alerts, events and information  Displays type of violation, time of occurrence and threat severity
  • 17. 17© 2015 IBM Corporation Event detail of mobile activity in QRadar System administrator view of specific mobile compliance violation via QRadar portal  Displays context surrounding threat severity  Aids in prioritization of response between violations
  • 18. 18© 2015 IBM Corporation Question: Of the following mobile device threat categories, which does your organization classify as most severe? Answers: A. Malware infected devices B. Jailbroken (iOS) or Rooted (Android) devices C. Lost/Stolen devices D. Personally-owned/BYOD devices E. Outdated OS Versions Poll Question #1
  • 19. © 2015 IBM Corporation Live demonstration
  • 20. 20© 2015 IBM Corporation Summary Continuous visibility into mobile threats and events  End-to-end risk protection and analysis provided by IBM Mobile Security solutions  Ongoing mobile event detection displayed from a single pane of glass  Access to detailed, customizable reports on events and user activity  Option to drill down to individual events to evaluate the severity of threats IBM QRadar Security Intelligence Platform IBM MobileFirst Protect
  • 21. © 2015 IBM Corporation Getting started
  • 22. 22© 2015 IBM Corporation Get started with IBM MobileFirst Protect now Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, apps and content Easy Set up and configure your service in minutes 1 2 3
  • 23. 23© 2015 IBM Corporation Integrate IBM MobileFirst Protect with IBM QRadar 1. If automatic updates are not enabled, download the following RPMs: • DSMCommon • IBM Fiberlink REST API Protocol • IBM Fiberlink MaaS360 2. Configure your MobileFirst Protect instance to enable communication with QRadar 3. Create a MobileFirst Protect log source on the QRadar console Additional details: http://ibm.co/1Sdmc3C
  • 24. 24© 2015 IBM Corporation Question: Would you like more information? Answers: A. Yes, please send me more information on IBM Security QRadar B. Yes, please send me more information on IBM MobileFirst Protect C. Yes, please send me more information on both QRadar and MobileFirst Protect D. No, not at this time Poll Question #2
  • 25. © 2015 IBM Corporation Questions?
  • 26. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOUwww.ibm.com/security
  • 27. © 2015 IBM Corporation Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third- party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. Legal notices and disclaimers