SlideShare a Scribd company logo
Cognitive unified endpoint management
Biju Tilak
MaaS360
2 IBM Security
Traditional mobile device
management solutions were
built for a simpler time.
Today’s IT leaders
have bigger ambitions.
3 IBM Security
Traditional client management Modern API management+
Technology convergence is changing the game
4 IBM Security
Unified Endpoint Management (UEM)
is the first step to enable today’s enterprise ecosystem.
Devices and things People and identity Apps and content
5 IBM Security
1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017..
of companies will use artificial intelligence (AI) or
cognitive computing to analyze endpoint data by 2020.> 80%
Cognitive technology
helps you deliver on
their expectations.
They expect
convenience.
Your employees
are consumers.
+
Balance control, deliver on expectations
=
6 IBM Security
Cognitive technology gives IT and
Security leaders the power to see:
• What happened
• What can happen
• What should be done
All in the context of your environment.
7 IBM Security
Cognitive offers a new approach
• Digging through news & blogs randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best practices ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
8 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Trusted Advisor
Augmented intelligence and cognitive computing
Actionable insights Contextual analytics
Apps and content People and identity
Apps Content Data Identity Threats Connectivity
Devices and things
Smartphones Tablets Laptops Wearables Internet of Things
Identity Management
10 IBM Security
• Seamless user experience with SSO to cloud
apps from desktop or mobile
• Conditional access preventing access from
unmanaged or non-compliant devices
• Instant on without any installation or infrastructure
• Flexible integration supports existing AD and
LDAP directories
• Bundled with MaaS360 additional licenses not
required
Enable access management through MaaS360 UEM New
SSO to Mobile, Web/SaaS apps
Identity Federation
Self-Service App Request
Onboarding, Provisioning
Step-up Authentication, MFA
Conditional Access Management
Threat and Risk Management
IBM Cloud Identity
11 IBM Security
Device Authentication
(Native Mobile SSO)
User launches
Application
SaaS/Web
applications
Native Mobile App SSO from a mobile device to enterprise resources
via integration with IBM Cloud Identity
IBM Cloud Identity
Connect
SAML SSO
12 IBM Security
Managed by MaaS360
Unmanaged APPROVED APPS
Provides SSO with conditional access ensuring only trusted
devices and applications can access enterprise resources
Compliant with IT Policy
Access granted
SSO to apps
Access denied
IBM Cloud Identity
This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
13 IBM Security
Addressing user pains with application access
Mobile Apps SaaS Apps
EMPLOYEE LINE OF BUSINESS IT SECURITY
USER PAINS • Multiple usernames and
passwords
• Difficult to find applications
• No idea how to request
access
• Current tools aren’t user
friendly
• Shadow IT costs are
expensive
• Too much time waiting on IT
• Loss of control over data
• Infrastructure costs
• IT skill dependencies
• Loss of security over data
• Roadblock for the business
• Heritage tools aren’t user
friendly
14 IBM Security
Plan for Identity Management with IBM Cloud Identity
Embedded Cloud Identity extends the MaaS360 platform and provides single sign-on with
conditional access to cloud applications
Web SaaS App SSO,
Identity Federation
Mobile Native App SSO,
Conditional Access Management
(iOS only, Q4 Android)
Single touch access
to mobile, web/SaaS apps
boosts productivity
Identity federation using
pre-integrated connectors to
popular SaaS applications
Conditional access ensures
only trusted devices, apps
access enterprise resources
Threat Management powered
by x-force exchange provides
risk data for apps
Stand-alone Identity and Access
Management platform with built-
in integration with MaaS360
Interoperability with 3rd party
Identity Providers allows
customers to leverage their
existing investments
Threat and Risk Management
IBM Cloud Identity
NOTE:
* Identity Management equates to IBM Cloud Identity Essentials
and does not include “Verify” (MFA) or the “ISAM Connector”.
This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
15 IBM Security
Leading macOS management services
MaaS360 covers all your macOS management needs
Enterprise Features
• Easy User Enrollment
• Remote Lock, Wipe
• Comprehensive macOS management
• Full API driven Profile management for Email, VPN,
Wi-Fi, Printer, Login window configuration with
certificates integration
• Enroll using DEP
Greater Security
• OS Restrictions for Apps, Updates, Media etc.
• FileVault provisioning, reporting and protection
• Endpoint Security Reporting for Firewall, Antivirus,
Encryption
• Patch & App Updates
macOS Sierra
OS X El Capitan
Apps
• Software Distribution
• App Store
• Remote Control
16 IBM Security
Software Distribution | OS / App Patch Management
17 IBM Security
Best in class to manage Windows 10
With MaaS360 and Windows 10, you can manage your smartphones and laptops
with all the ease that you have come to associate with MaaS360
Provisioning Windows 10 Devices
• Easy device enrollment
• Wi-Fi, VPN Configurations
• Locate action and more
• Out of box enrollment for Windows 10 devices
Greater Security
• More Passcode configurations
• Full Certificates lifecycle Integration
• Apps Compliance
• Enterprise Data Protection for Documents
• Health Attestation
• Compliance Rules
• Advanced Patch & 3rd party App Updates
Apps
• Software Distribution
• App Store
• Remote Control
Window 10
Support
18 IBM Security
Software Distribution | OS / App Patch Management
Appendix
COGNITIVE UEM EDITIONS
20 IBM Security
with Watson – cognitive UEM editions
Solution Essentials Deluxe Premier Enterprise
Device Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
App Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
Patch and Update Management ✔ ✔ ✔ ✔
Identity Management ✔ ✔ ✔ ✔
Advisor ✔ ✔ ✔ ✔
Container App ✔ ✔ ✔ ✔
Mobile Expense Management ✔ ✔ ✔ ✔
Secure Mobile Mail ✔ ✔ ✔
Secure Mobile Chat ✔ ✔ ✔
OS VPN ✔ ✔
Secure Browser ✔ ✔
Gateway for Browser ✔ ✔
Content Management ✔ ✔
Gateway for Documents ✔ ✔
App Security ✔ ✔
Gateway for Apps ✔ ✔
Mobile Document Editor ✔
Mobile Document Sync ✔
Mobile Threat Management ✔
TeamViewer Remote Support O O O O
21 IBM Security
App Management
Deploy custom enterprise app catalogs
Blacklist, whitelist & require apps
Administer app volume purchase programs
Device Management
Manage smartphones, tablets & laptops
featuring iOS, Android, Windows 10
Mobile, Windows 7, Windows 10 &
macOS
Gain complete visibility of devices,
security & network
Enforce compliance with real-time &
automated actions
Essentials Edition – a great first step for cognitive UEM
Patch & Update Management
Identify & report on missing OS patches
Schedule distribution and installation of
Windows OS & macOS patches
Determine outstanding updates to third
party Windows and macOS applications,
like Java & Adobe
Identity Management
Single sign-on & touch access
Conditional access to trusted devices
Identity federation with apps
22 IBM Security
Container App
A separate, corporate mobile workplace
for iOS, Android & Windows
Productivity apps for work in one place
Data leak prevention controls to restrict
copy-paste & forwarding of content
Advisor
Boost user productivity by identifying policy and app deployment
enhancements
Discover security vulnerabilities & emerging threats to endpoints,
apps & data
Improve IT operational efficiency by applying best practices &
learning from industry & peer benchmarks
Essentials Edition – a great first step for cognitive UEM
Mobile Expense Management
Monitor mobile data usage with real-time alerts
Set policies to restrict or limit data & voice
roaming
Review integrated reporting & analytics
23 IBM Security
Deluxe Edition – add email and chat containerization
includes all solutions from Essentials Edition
Secure Mobile Mail
Contain emails, attachments & chat to prevent data leakage
Enforce authentication, copy/paste & forwarding restrictions
FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Secure Mobile Chat
Enhance on-the-go collaboration and productivity
Contain all chat mobile conversations and data
Establish quick connections via corporate directory lookup
24 IBM Security
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
Secure Browser
A feature-rich web browser for secure access to intranet sites
Define URL filters & security policies based on categories
Block known malicious websites
OS VPN
Preserves the native VPN experience for iOS and Android users
Leverages the hosted MaaS360 Certificate Authority to issue authentication certs
Deployed alongside your corporate VPN solution
Gateway for Browser
Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web
apps & network resources
Access seamlessly & securely without needing a VPN session on mobile device
25 IBM Security
Gateway for Documents
Secure access to internal files:
e.g., SharePoint & Windows File Share
Retrieve enterprise documents without a VPN
session
Content Management
Contain documents & files to prevent
data leakage
Enforce authentication, copy/paste &
view-only restrictions
Access distributed content/repositories:
SharePoint, Box, Google Drive &
OneDrive
App Security
Contain enterprise apps with a simple
app wrapper or SDK
Enforce authentication & copy/paste
restrictions
Prevent access from compromised
devices
Gateway for Apps
Add per app VPN to Application
Security to integrate behind-the-
firewall data in private apps
Incorporate enterprise data without a
device VPN session
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
26 IBM Security
Enterprise Edition – the ultimate package for protection & productivity
includes all solutions from Deluxe Edition
Mobile Document Sync
Synchronize user content across managed devices
Restrict copy/paste & opening in unmanaged apps
Store content securely, both in the cloud & on devices
Mobile Document Editor
Create, edit & save content in a secure, encrypted container
Collaborate on Word, Excel, PowerPoint & text files
Change fonts & insert images, tables, shapes, links & more
Mobile Threat Management
Detect and analyze mobile malware on compromised devices
Automate remediation via near real-time compliance engine
Take action on jailbroken/rooted devices over-the-air
27 IBM Security
TeamViewer Remote Support for IBM MaaS360
• Connect in seconds to obtain real-world remote device views and perform remote control functions
• Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops
• Conduct remote device configurations, provisioning, remediation of connectivity issues and more
• Reduce the volume of IT help desk calls and
emailed requests for device support
• Increase productivity for IT administrators and end users
28 IBM Security
Next steps
Demo
Participate in a
deep-dive demo
with our experts
Deploy
Start managing and
securing your mobile
environment
Evaluate
Set up and
configure your
custom trial service
1 2 3
29 IBM Security
Strong adoption in the enterprise
Manufacturing Consumer Public Others
Trusted by over 14,000 customers
Financial Healthcare
30 IBM Security
Complete
UEM
of mobile devices,
laptops & things
Best-in-class
cloud
on a mature,
trusted platform
Open
platform
for integration with
leading IT systems
for actionable insights
& cognitive analytics
What sets IBM MaaS360 apart
Industry-best
user interfaces
for app catalogs &
workplace container
Dedicated to
your success
with 24x7x365 support
by chat, phone, email
31 IBM Security
Best-in-class cloud delivery model
Fast deployment
Simple, self-service
provisioning process
designed for maximum
configurability
Effortless scalability
Trial instantly becomes
production environment
with ability turn up new
devices, users, apps
Automatic upgrades
Continuously updated daily
with new capabilities
and same day OS support
for the latest platform
Cloud expertise
Dedicated team
supporting a mature
platform with unmatched
security certifications
Agility of the cloud for the pace of change in mobility
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
https://www.youtube.com/user/ibmse
curitysolutions
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

More Related Content

What's hot

AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
Amazon Web Services
 
Cloud computing presentation.pdf
Cloud computing presentation.pdfCloud computing presentation.pdf
Cloud computing presentation.pdf
MdEasin19
 
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
Amazon Web Services Korea
 
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
Amazon Web Services Korea
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
David J Rosenthal
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Amazon Web Services
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
Atanas Gergiminov
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway
 
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
Amazon Web Services Korea
 
Data power Performance Tuning
Data power Performance TuningData power Performance Tuning
Data power Performance TuningKINGSHUK MAJUMDER
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
DelforChacnCornejo
 
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
Edureka!
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
Amazon Web Services
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
PencilData
 
Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)
Jatinder Randhawa
 
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018Amazon Web Services Korea
 
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
Amazon Web Services Korea
 
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Amazon Web Services
 
FortiRecon Sales Presentation (1).pptx
FortiRecon Sales Presentation (1).pptxFortiRecon Sales Presentation (1).pptx
FortiRecon Sales Presentation (1).pptx
Alejandro Daricz
 

What's hot (20)

AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
Cloud computing presentation.pdf
Cloud computing presentation.pdfCloud computing presentation.pdf
Cloud computing presentation.pdf
 
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
AWS Summit Seoul 2023 | 산업용 ‘이음(e-Um) 5G’ 특화망을 위한 KT의 AWS 기반 사설 5G 서비스
 
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
비즈니스 리더를 위한 디지털 트랜스포메이션 트렌드 - 김지현, 김영현 AWS 사업개발 매니저 :: AWS re:Invent re:Cap 2021
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
Module 1: Introduction to the AWS Cloud - AWSome Day Online Conference 2019
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
 
Data power Performance Tuning
Data power Performance TuningData power Performance Tuning
Data power Performance Tuning
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
AWS Lambda Tutorial | Introduction to AWS Lambda | AWS Tutorial | AWS Trainin...
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
QRadar Architecture.pdf
QRadar Architecture.pdfQRadar Architecture.pdf
QRadar Architecture.pdf
 
Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)
 
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018
AWS Support에서 제안하는 멋진 클라우드 아키텍처 디자인::조성열:: AWS Summit Seoul 2018
 
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
AWS와 함께하는 클라우드 컴퓨팅 - 강철, AWS 어카운트 매니저 :: AWS Builders 100
 
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
 
FortiRecon Sales Presentation (1).pptx
FortiRecon Sales Presentation (1).pptxFortiRecon Sales Presentation (1).pptx
FortiRecon Sales Presentation (1).pptx
 

Similar to IBM MaaS360 with watson

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
Sylvia Low
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
IBM Security
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
gule mariam
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
IBM Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
Prolifics
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
Sreeni Pamidala
 
Laptop management
Laptop managementLaptop management
Laptop management
Killian Delaney
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
Killian Delaney
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
AGILLY
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
IBM Danmark
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
Killian Delaney
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
Killian Delaney
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 

Similar to IBM MaaS360 with watson (20)

MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

More from Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
Prime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
Prime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
Prime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Prime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Prime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
Prime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
Prime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
Prime Infoserv
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
Prime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
Prime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
Prime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Prime Infoserv
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
Prime Infoserv
 

More from Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 

Recently uploaded

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 

Recently uploaded (13)

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 

IBM MaaS360 with watson

  • 1. Cognitive unified endpoint management Biju Tilak MaaS360
  • 2. 2 IBM Security Traditional mobile device management solutions were built for a simpler time. Today’s IT leaders have bigger ambitions.
  • 3. 3 IBM Security Traditional client management Modern API management+ Technology convergence is changing the game
  • 4. 4 IBM Security Unified Endpoint Management (UEM) is the first step to enable today’s enterprise ecosystem. Devices and things People and identity Apps and content
  • 5. 5 IBM Security 1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017.. of companies will use artificial intelligence (AI) or cognitive computing to analyze endpoint data by 2020.> 80% Cognitive technology helps you deliver on their expectations. They expect convenience. Your employees are consumers. + Balance control, deliver on expectations =
  • 6. 6 IBM Security Cognitive technology gives IT and Security leaders the power to see: • What happened • What can happen • What should be done All in the context of your environment.
  • 7. 7 IBM Security Cognitive offers a new approach • Digging through news & blogs randomly • Manually searching in platform DISCOVER • Being alerted with insights & news • Asking questions, getting answers • Spending hours learning DEFINE • Getting knowledge served to you • Fumbling for relevancy & best practices ASSESS • Gaining instant understanding & recommendations • Developing an action plan ACT • Taking immediate action within context GO FROM TO
  • 8. 8 IBM Security IBM MaaS360 with Watson for cognitive UEM Trusted Advisor Augmented intelligence and cognitive computing Actionable insights Contextual analytics Apps and content People and identity Apps Content Data Identity Threats Connectivity Devices and things Smartphones Tablets Laptops Wearables Internet of Things
  • 10. 10 IBM Security • Seamless user experience with SSO to cloud apps from desktop or mobile • Conditional access preventing access from unmanaged or non-compliant devices • Instant on without any installation or infrastructure • Flexible integration supports existing AD and LDAP directories • Bundled with MaaS360 additional licenses not required Enable access management through MaaS360 UEM New SSO to Mobile, Web/SaaS apps Identity Federation Self-Service App Request Onboarding, Provisioning Step-up Authentication, MFA Conditional Access Management Threat and Risk Management IBM Cloud Identity
  • 11. 11 IBM Security Device Authentication (Native Mobile SSO) User launches Application SaaS/Web applications Native Mobile App SSO from a mobile device to enterprise resources via integration with IBM Cloud Identity IBM Cloud Identity Connect SAML SSO
  • 12. 12 IBM Security Managed by MaaS360 Unmanaged APPROVED APPS Provides SSO with conditional access ensuring only trusted devices and applications can access enterprise resources Compliant with IT Policy Access granted SSO to apps Access denied IBM Cloud Identity This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
  • 13. 13 IBM Security Addressing user pains with application access Mobile Apps SaaS Apps EMPLOYEE LINE OF BUSINESS IT SECURITY USER PAINS • Multiple usernames and passwords • Difficult to find applications • No idea how to request access • Current tools aren’t user friendly • Shadow IT costs are expensive • Too much time waiting on IT • Loss of control over data • Infrastructure costs • IT skill dependencies • Loss of security over data • Roadblock for the business • Heritage tools aren’t user friendly
  • 14. 14 IBM Security Plan for Identity Management with IBM Cloud Identity Embedded Cloud Identity extends the MaaS360 platform and provides single sign-on with conditional access to cloud applications Web SaaS App SSO, Identity Federation Mobile Native App SSO, Conditional Access Management (iOS only, Q4 Android) Single touch access to mobile, web/SaaS apps boosts productivity Identity federation using pre-integrated connectors to popular SaaS applications Conditional access ensures only trusted devices, apps access enterprise resources Threat Management powered by x-force exchange provides risk data for apps Stand-alone Identity and Access Management platform with built- in integration with MaaS360 Interoperability with 3rd party Identity Providers allows customers to leverage their existing investments Threat and Risk Management IBM Cloud Identity NOTE: * Identity Management equates to IBM Cloud Identity Essentials and does not include “Verify” (MFA) or the “ISAM Connector”. This information represents the current intent of IBM Product Development. Plans may change at any time for any reason at the sole discretion of IBM
  • 15. 15 IBM Security Leading macOS management services MaaS360 covers all your macOS management needs Enterprise Features • Easy User Enrollment • Remote Lock, Wipe • Comprehensive macOS management • Full API driven Profile management for Email, VPN, Wi-Fi, Printer, Login window configuration with certificates integration • Enroll using DEP Greater Security • OS Restrictions for Apps, Updates, Media etc. • FileVault provisioning, reporting and protection • Endpoint Security Reporting for Firewall, Antivirus, Encryption • Patch & App Updates macOS Sierra OS X El Capitan Apps • Software Distribution • App Store • Remote Control
  • 16. 16 IBM Security Software Distribution | OS / App Patch Management
  • 17. 17 IBM Security Best in class to manage Windows 10 With MaaS360 and Windows 10, you can manage your smartphones and laptops with all the ease that you have come to associate with MaaS360 Provisioning Windows 10 Devices • Easy device enrollment • Wi-Fi, VPN Configurations • Locate action and more • Out of box enrollment for Windows 10 devices Greater Security • More Passcode configurations • Full Certificates lifecycle Integration • Apps Compliance • Enterprise Data Protection for Documents • Health Attestation • Compliance Rules • Advanced Patch & 3rd party App Updates Apps • Software Distribution • App Store • Remote Control Window 10 Support
  • 18. 18 IBM Security Software Distribution | OS / App Patch Management
  • 20. 20 IBM Security with Watson – cognitive UEM editions Solution Essentials Deluxe Premier Enterprise Device Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ App Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ Patch and Update Management ✔ ✔ ✔ ✔ Identity Management ✔ ✔ ✔ ✔ Advisor ✔ ✔ ✔ ✔ Container App ✔ ✔ ✔ ✔ Mobile Expense Management ✔ ✔ ✔ ✔ Secure Mobile Mail ✔ ✔ ✔ Secure Mobile Chat ✔ ✔ ✔ OS VPN ✔ ✔ Secure Browser ✔ ✔ Gateway for Browser ✔ ✔ Content Management ✔ ✔ Gateway for Documents ✔ ✔ App Security ✔ ✔ Gateway for Apps ✔ ✔ Mobile Document Editor ✔ Mobile Document Sync ✔ Mobile Threat Management ✔ TeamViewer Remote Support O O O O
  • 21. 21 IBM Security App Management Deploy custom enterprise app catalogs Blacklist, whitelist & require apps Administer app volume purchase programs Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows 10 Mobile, Windows 7, Windows 10 & macOS Gain complete visibility of devices, security & network Enforce compliance with real-time & automated actions Essentials Edition – a great first step for cognitive UEM Patch & Update Management Identify & report on missing OS patches Schedule distribution and installation of Windows OS & macOS patches Determine outstanding updates to third party Windows and macOS applications, like Java & Adobe Identity Management Single sign-on & touch access Conditional access to trusted devices Identity federation with apps
  • 22. 22 IBM Security Container App A separate, corporate mobile workplace for iOS, Android & Windows Productivity apps for work in one place Data leak prevention controls to restrict copy-paste & forwarding of content Advisor Boost user productivity by identifying policy and app deployment enhancements Discover security vulnerabilities & emerging threats to endpoints, apps & data Improve IT operational efficiency by applying best practices & learning from industry & peer benchmarks Essentials Edition – a great first step for cognitive UEM Mobile Expense Management Monitor mobile data usage with real-time alerts Set policies to restrict or limit data & voice roaming Review integrated reporting & analytics
  • 23. 23 IBM Security Deluxe Edition – add email and chat containerization includes all solutions from Essentials Edition Secure Mobile Mail Contain emails, attachments & chat to prevent data leakage Enforce authentication, copy/paste & forwarding restrictions FIPS 140-2 compliant, AES-256 bit encryption for data at rest Secure Mobile Chat Enhance on-the-go collaboration and productivity Contain all chat mobile conversations and data Establish quick connections via corporate directory lookup
  • 24. 24 IBM Security Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition Secure Browser A feature-rich web browser for secure access to intranet sites Define URL filters & security policies based on categories Block known malicious websites OS VPN Preserves the native VPN experience for iOS and Android users Leverages the hosted MaaS360 Certificate Authority to issue authentication certs Deployed alongside your corporate VPN solution Gateway for Browser Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web apps & network resources Access seamlessly & securely without needing a VPN session on mobile device
  • 25. 25 IBM Security Gateway for Documents Secure access to internal files: e.g., SharePoint & Windows File Share Retrieve enterprise documents without a VPN session Content Management Contain documents & files to prevent data leakage Enforce authentication, copy/paste & view-only restrictions Access distributed content/repositories: SharePoint, Box, Google Drive & OneDrive App Security Contain enterprise apps with a simple app wrapper or SDK Enforce authentication & copy/paste restrictions Prevent access from compromised devices Gateway for Apps Add per app VPN to Application Security to integrate behind-the- firewall data in private apps Incorporate enterprise data without a device VPN session Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition
  • 26. 26 IBM Security Enterprise Edition – the ultimate package for protection & productivity includes all solutions from Deluxe Edition Mobile Document Sync Synchronize user content across managed devices Restrict copy/paste & opening in unmanaged apps Store content securely, both in the cloud & on devices Mobile Document Editor Create, edit & save content in a secure, encrypted container Collaborate on Word, Excel, PowerPoint & text files Change fonts & insert images, tables, shapes, links & more Mobile Threat Management Detect and analyze mobile malware on compromised devices Automate remediation via near real-time compliance engine Take action on jailbroken/rooted devices over-the-air
  • 27. 27 IBM Security TeamViewer Remote Support for IBM MaaS360 • Connect in seconds to obtain real-world remote device views and perform remote control functions • Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops • Conduct remote device configurations, provisioning, remediation of connectivity issues and more • Reduce the volume of IT help desk calls and emailed requests for device support • Increase productivity for IT administrators and end users
  • 28. 28 IBM Security Next steps Demo Participate in a deep-dive demo with our experts Deploy Start managing and securing your mobile environment Evaluate Set up and configure your custom trial service 1 2 3
  • 29. 29 IBM Security Strong adoption in the enterprise Manufacturing Consumer Public Others Trusted by over 14,000 customers Financial Healthcare
  • 30. 30 IBM Security Complete UEM of mobile devices, laptops & things Best-in-class cloud on a mature, trusted platform Open platform for integration with leading IT systems for actionable insights & cognitive analytics What sets IBM MaaS360 apart Industry-best user interfaces for app catalogs & workplace container Dedicated to your success with 24x7x365 support by chat, phone, email
  • 31. 31 IBM Security Best-in-class cloud delivery model Fast deployment Simple, self-service provisioning process designed for maximum configurability Effortless scalability Trial instantly becomes production environment with ability turn up new devices, users, apps Automatic upgrades Continuously updated daily with new capabilities and same day OS support for the latest platform Cloud expertise Dedicated team supporting a mature platform with unmatched security certifications Agility of the cloud for the pace of change in mobility
  • 32. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity https://www.youtube.com/user/ibmse curitysolutions © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU