SlideShare a Scribd company logo
1© 2015 IBM Corporation© 2015 IBM Corporation
Enhanced Mobile Security in Your Back Pocket
Android for Work and MaaS360
2© 2015 IBM Corporation
Housekeeping items
✓Duration – 60 minutes
✓Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
✓Recording and slides will be
emailed to you
3© 2015 IBM Corporation
Agenda
Android for Work by Google
Program review
Technical solution
AfW use cases
New features in M
MaaS360 by IBM
Product review
AfW integration
Q&A
4© 2015 IBM Corporation
Android for Work Overview
Nadim Tawileh| Product Manager
Foundation
Android for Work is based on open
standards and flexible APIs
Framework APIs provide integration
points for EMMs and ISVs
Android for Work app delivers common management and
security layer to all Android devices
Play for Work provides a common app
management framework
Platform can be extended by
ecosystem partners
OEMs can provide extra capabilities and
extend Android for Work
EMMs and ISVs communicate via
configuration conventions
Continued investment and support
Feedback from partners critical for development
Joint approach to expanding the market to
more customers
Foundation
Android
Work Profile
Google Play
for Work
St andardized
Management
Innovat ion
& Choice
Secure Android for BYOD and
Corporate issued devices
Deploy and manage business
apps on any device through
Google Play
Consistent and easily managed
environment across all mobile
devices
Leverage Android ecosystem to
deliver innovation and infinite
choice
Work Profiles
Extension of Lollipop’s
default encryption,
security enforcement and
multi-user support
A dedicated work profile
isolates and protects
work data - Badged work
apps sit right alongside
personal apps
Users know IT only
manages work data and
can’t erase or view
personal content.
Android for Work app
For devices that don’t run
Work Profiles.
Secure mail, calendar,
contacts, documents,
browsing and access to
approved work apps.
Can be completely
managed by IT.
Work Managed Device
For corporate-liable
deployments which
require management of
the entire device.
Set up Work Managed
Device from initial boot
including NFC-based
provisioning.
Deploy only selected apps
-- internal or 3rd party --
to managed devices.
Google Play for Work
Allows IT to securely
purchase, deploy and
manage business apps
Any app in the Play
catalog to be deployed to
the Work Profile; a subset
to the Android for Work
app
Simplifies process of
distributing apps and
ensures IT approves every
app deployed to workers
BYOD CYOD
COPE
Mobile for everyone
BYOD Secure corporate Single-purpose Small business
Single Use
● Enhanced controls
● Silent install/uninstall of apps
● OTA updates
● Bump to configure
New in
Improved
management
Delegate cert installer
Enterprise certs
Wifi configuration
Enterprise factory reset
protection
New in
Better BYOD
● Improved enterprise contacts
● Work status notifications
● Data usage tracking
New in
18© 2015 IBM Corporation© 2015 IBM Corporation
MaaS360 and Android for Work
Frank Schloendorn, Director of Quality Assurance, IBM
19© 2015 IBM Corporation
Why MaaS360?
Integrated
solutions that connect
seamlessly to your
existing and external
environments
Scalable
data security with
intelligence for the
volume, speed, and
variability of mobile
Complete
management of
devices, apps, content
and users from a
single platform
20© 2015 IBM Corporation
Complete mobility management and security
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
21© 2015 IBM Corporation
Android for Work – MaaS360 Integration
▪ Easy Integration
– Add your AfW token information to MaaS360 and proceed
to configure
▪ Settings are available in Android Policy
– “Android Work Settings” Tab
– Single policy capability for AfW and non-AfW devices
▪ New App Management Options
– Deploy Google Play Apps Automatically
– Create Android for Work Play Store bundles within
MaaS360
▪ Control default enrollment mode
– MDM or Android Work
▪ Familiar Activation Experience
– Just two new screens to set up Android Work profile
▪ Access to other capabilities of MaaS360 solution
– Document distribution, Secure Browser, Mobile Access
Gateway, etc.
21
22© 2015 IBM Corporation
Get started now
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices, apps
and content
Easy
Set up and configure
your service in
minutes
1 2 3
© 2015 IBM Corporation
IBM Security
23
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed,
misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product
should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use
or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily
involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT
THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

More Related Content

What's hot

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
SPEC INDIA
 
Ekran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring ToolEkran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring Tool
cloudlabs
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
IBM Security
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
WSO2
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
Symantec
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
Killian Delaney
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
eonMyWorkplace Processes
eonMyWorkplace ProcesseseonMyWorkplace Processes
eonMyWorkplace Processes
ekaterini
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
ManageEngine
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...
aOS Community
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
Fernando M. Imperiale
 
Session 6050
Session 6050Session 6050
Session 6050
Daniel Leroux
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
Peter Laitin
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
Simon May
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
MRPeasy
 

What's hot (20)

Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Ekran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring ToolEkran System - Employee Activity Monitoring Tool
Ekran System - Employee Activity Monitoring Tool
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
WSO2 Product Release Webinar: WSO2 Enterprise Mobility Manager 2.0
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
eonMyWorkplace Processes
eonMyWorkplace ProcesseseonMyWorkplace Processes
eonMyWorkplace Processes
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...Microsoft intune with managed apps and security device policies - Sascha Fred...
Microsoft intune with managed apps and security device policies - Sascha Fred...
 
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajarFernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar
 
Session 6050
Session 6050Session 6050
Session 6050
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Advantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing softwareAdvantages and disadvantages of cloud based manufacturing software
Advantages and disadvantages of cloud based manufacturing software
 

Viewers also liked

Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Bee_Ware
 
AMAN CC Sécurité Numérique mobile 31 Mai 2013
AMAN CC Sécurité Numérique mobile 31 Mai 2013AMAN CC Sécurité Numérique mobile 31 Mai 2013
AMAN CC Sécurité Numérique mobile 31 Mai 2013
Abdeljalil AGNAOU
 
Securite sur les applis rencontres
Securite sur les applis rencontresSecurite sur les applis rencontres
Securite sur les applis rencontres
DatingProfessional
 
Public Relationship In Healthcare
Public Relationship In HealthcarePublic Relationship In Healthcare
Public Relationship In Healthcare
Avinash Advani
 
Applications mobiles et sécurité
Applications mobiles et sécuritéApplications mobiles et sécurité
Applications mobiles et sécurité
Bitdefender en France
 
Public relation
Public relationPublic relation
Public relation
Vikram Ram
 
The Role of Public Relations in an Organization
The Role of Public Relations in an OrganizationThe Role of Public Relations in an Organization
The Role of Public Relations in an Organization
Sundance Marketing
 
Public relation.ppt
Public relation.pptPublic relation.ppt
Public relation.ppt
Kashish Gupta
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
SVS
 
Public Relations
Public RelationsPublic Relations
Public Relations
Prathamesh Parab
 
Sécurité des applications mobiles
Sécurité des applications mobilesSécurité des applications mobiles
Sécurité des applications mobilesSebastien Gioria
 
OWASP Mobile Top10 - Les 10 risques sur les mobiles
OWASP Mobile Top10 -  Les 10 risques sur les mobilesOWASP Mobile Top10 -  Les 10 risques sur les mobiles
OWASP Mobile Top10 - Les 10 risques sur les mobiles
Sébastien GIORIA
 
Public relations
Public relationsPublic relations
Public relations
Saxbee Consultants
 
Pollution its types, causes and effects by naveed.m
Pollution its types, causes and effects by naveed.mPollution its types, causes and effects by naveed.m
Pollution its types, causes and effects by naveed.m
Naveed Abbas Malik
 
Different Tools of Public Relations
Different Tools of Public RelationsDifferent Tools of Public Relations
Different Tools of Public Relations
Housefull1234567890
 
Save Environment PPT
Save Environment PPTSave Environment PPT
Save Environment PPT
VikrantPatankar
 

Viewers also liked (16)

Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
AMAN CC Sécurité Numérique mobile 31 Mai 2013
AMAN CC Sécurité Numérique mobile 31 Mai 2013AMAN CC Sécurité Numérique mobile 31 Mai 2013
AMAN CC Sécurité Numérique mobile 31 Mai 2013
 
Securite sur les applis rencontres
Securite sur les applis rencontresSecurite sur les applis rencontres
Securite sur les applis rencontres
 
Public Relationship In Healthcare
Public Relationship In HealthcarePublic Relationship In Healthcare
Public Relationship In Healthcare
 
Applications mobiles et sécurité
Applications mobiles et sécuritéApplications mobiles et sécurité
Applications mobiles et sécurité
 
Public relation
Public relationPublic relation
Public relation
 
The Role of Public Relations in an Organization
The Role of Public Relations in an OrganizationThe Role of Public Relations in an Organization
The Role of Public Relations in an Organization
 
Public relation.ppt
Public relation.pptPublic relation.ppt
Public relation.ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 
Public Relations
Public RelationsPublic Relations
Public Relations
 
Sécurité des applications mobiles
Sécurité des applications mobilesSécurité des applications mobiles
Sécurité des applications mobiles
 
OWASP Mobile Top10 - Les 10 risques sur les mobiles
OWASP Mobile Top10 -  Les 10 risques sur les mobilesOWASP Mobile Top10 -  Les 10 risques sur les mobiles
OWASP Mobile Top10 - Les 10 risques sur les mobiles
 
Public relations
Public relationsPublic relations
Public relations
 
Pollution its types, causes and effects by naveed.m
Pollution its types, causes and effects by naveed.mPollution its types, causes and effects by naveed.m
Pollution its types, causes and effects by naveed.m
 
Different Tools of Public Relations
Different Tools of Public RelationsDifferent Tools of Public Relations
Different Tools of Public Relations
 
Save Environment PPT
Save Environment PPTSave Environment PPT
Save Environment PPT
 

Similar to Android for Work Sécurité Mobile avancée dans la poche

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
AGILLY
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
IBM Security
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
AGILLY
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
AGILLY
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
Shikha Srivastava
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
AGILLY
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
AGILLY
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
AGILLY
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
SocialBiz UserGroup
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
AGILLY
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
Vincent Burckhardt
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
AGILLY
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
eileendohertysmith
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
Jeremy Siewert
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
Michael Elder
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Symantec
 

Similar to Android for Work Sécurité Mobile avancée dans la poche (20)

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Advanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NETAdvanced Mobile Content Collaboration with BOX.NET
Advanced Mobile Content Collaboration with BOX.NET
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Why Ibm cloud private
Why Ibm cloud private Why Ibm cloud private
Why Ibm cloud private
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 
Tip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundupTip from ConnectED 2015: Mobile security roundup
Tip from ConnectED 2015: Mobile security roundup
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
App infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_finalApp infrastructure &_integration_keynote_final
App infrastructure &_integration_keynote_final
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018Introduction to IBM Cloud Private - April 2018
Introduction to IBM Cloud Private - April 2018
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 

More from AGILLY

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
AGILLY
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
AGILLY
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
AGILLY
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
AGILLY
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
AGILLY
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
AGILLY
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
AGILLY
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
AGILLY
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
AGILLY
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
AGILLY
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
AGILLY
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
AGILLY
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
AGILLY
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
AGILLY
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
AGILLY
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
AGILLY
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrement
AGILLY
 

More from AGILLY (20)

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrement
 

Recently uploaded

E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
Severalnines
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
aisafed42
 

Recently uploaded (20)

E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Kubernetes at Scale: Going Multi-Cluster with Istio
Kubernetes at Scale:  Going Multi-Cluster  with IstioKubernetes at Scale:  Going Multi-Cluster  with Istio
Kubernetes at Scale: Going Multi-Cluster with Istio
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabhQuarter 3 SLRP grade 9.. gshajsbhhaheabh
Quarter 3 SLRP grade 9.. gshajsbhhaheabh
 

Android for Work Sécurité Mobile avancée dans la poche

  • 1. 1© 2015 IBM Corporation© 2015 IBM Corporation Enhanced Mobile Security in Your Back Pocket Android for Work and MaaS360
  • 2. 2© 2015 IBM Corporation Housekeeping items ✓Duration – 60 minutes ✓Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen ✓Recording and slides will be emailed to you
  • 3. 3© 2015 IBM Corporation Agenda Android for Work by Google Program review Technical solution AfW use cases New features in M MaaS360 by IBM Product review AfW integration Q&A
  • 4. 4© 2015 IBM Corporation Android for Work Overview Nadim Tawileh| Product Manager
  • 6. Android for Work is based on open standards and flexible APIs Framework APIs provide integration points for EMMs and ISVs Android for Work app delivers common management and security layer to all Android devices Play for Work provides a common app management framework Platform can be extended by ecosystem partners OEMs can provide extra capabilities and extend Android for Work EMMs and ISVs communicate via configuration conventions Continued investment and support Feedback from partners critical for development Joint approach to expanding the market to more customers Foundation
  • 7. Android Work Profile Google Play for Work St andardized Management Innovat ion & Choice Secure Android for BYOD and Corporate issued devices Deploy and manage business apps on any device through Google Play Consistent and easily managed environment across all mobile devices Leverage Android ecosystem to deliver innovation and infinite choice
  • 8. Work Profiles Extension of Lollipop’s default encryption, security enforcement and multi-user support A dedicated work profile isolates and protects work data - Badged work apps sit right alongside personal apps Users know IT only manages work data and can’t erase or view personal content.
  • 9. Android for Work app For devices that don’t run Work Profiles. Secure mail, calendar, contacts, documents, browsing and access to approved work apps. Can be completely managed by IT.
  • 10. Work Managed Device For corporate-liable deployments which require management of the entire device. Set up Work Managed Device from initial boot including NFC-based provisioning. Deploy only selected apps -- internal or 3rd party -- to managed devices.
  • 11. Google Play for Work Allows IT to securely purchase, deploy and manage business apps Any app in the Play catalog to be deployed to the Work Profile; a subset to the Android for Work app Simplifies process of distributing apps and ensures IT approves every app deployed to workers
  • 12.
  • 14. BYOD Secure corporate Single-purpose Small business
  • 15. Single Use ● Enhanced controls ● Silent install/uninstall of apps ● OTA updates ● Bump to configure New in
  • 16. Improved management Delegate cert installer Enterprise certs Wifi configuration Enterprise factory reset protection New in
  • 17. Better BYOD ● Improved enterprise contacts ● Work status notifications ● Data usage tracking New in
  • 18. 18© 2015 IBM Corporation© 2015 IBM Corporation MaaS360 and Android for Work Frank Schloendorn, Director of Quality Assurance, IBM
  • 19. 19© 2015 IBM Corporation Why MaaS360? Integrated solutions that connect seamlessly to your existing and external environments Scalable data security with intelligence for the volume, speed, and variability of mobile Complete management of devices, apps, content and users from a single platform
  • 20. 20© 2015 IBM Corporation Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access
  • 21. 21© 2015 IBM Corporation Android for Work – MaaS360 Integration ▪ Easy Integration – Add your AfW token information to MaaS360 and proceed to configure ▪ Settings are available in Android Policy – “Android Work Settings” Tab – Single policy capability for AfW and non-AfW devices ▪ New App Management Options – Deploy Google Play Apps Automatically – Create Android for Work Play Store bundles within MaaS360 ▪ Control default enrollment mode – MDM or Android Work ▪ Familiar Activation Experience – Just two new screens to set up Android Work profile ▪ Access to other capabilities of MaaS360 solution – Document distribution, Secure Browser, Mobile Access Gateway, etc. 21
  • 22. 22© 2015 IBM Corporation Get started now Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, apps and content Easy Set up and configure your service in minutes 1 2 3
  • 23. © 2015 IBM Corporation IBM Security 23 www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.