© 2015 IBM Corporation
A New Era of Security
for a New Era of Computing
November 19, 2015
IBM Security
2© 2015 IBM Corporation
Expand the value of security solutions through integration
Continuous actionable intelligence
Consulting
Services
IBM X-Force Research
Managed
Services
Trusteer Apex
Endpoint
zSecure
BigFix
Advanced
Fraud
Trusteer
Pinpoint
Trusteer
Rapport
Data
Key Lifecycle Manager
Guardium Suite
Mobile
MobileFirst Protect
(MaaS360)
MobileFirst Platform
(Worklight)
Network
Network
Protection XGS
SiteProtector
Applications
AppScan
Identity
and Access
Privileged Identity Manager
Access Manager
Identity Manager
QRadar SIEM
QRadar Log Manager
QRadar Vulnerability
Manager
QRadar
Incident
Forensics
QRadar
Risk
Manager
Ecosystem Partners
Trusteer
Mobile
Security
Intelligence
3© 2015 IBM Corporation
IBM Security latest analyst report rankings
Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23
Domain Market Segment / Report
Gartner
Magic Quadrant (MQ)
Market Share (MS)
Forrester
Wave
IDC
Market Share (MS)
MarketScape (MSc)
Security Intelligence Security Information and Event Management (SIEM) Leader
2015 MQ / 2015 MS
Leader
2015 MS
Fraud Protection Web Fraud Detection (Trusteer) Leader
2013 MQ
Identity and
Access Management
Federated Identity Management and Single Sign-On
Leader
2013 MSc
Identity and Access Governance Leader
2015 MQ / 2015 MS
Strong Contender
2013
Identity and Access Management as a Service (IDaaS) Visionary
2015 MQ
Web Access Management (WAM) Leader
‘13 MarketScope, ‘15 MS
Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan
Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole
Data Security
Database Auditing and Real-Time Protection Leader
2011
Data Masking Leader
2014 MQ
Application Security Application Security Testing (dynamic and static) Leader
2014 MQ / 2015 MS
Leader
2014
Leader
2013 MS
Network, Endpoint
and Mobile Security
Network Intrusion Prevention Systems (NIPS) Challenger
2014 MQ
Endpoint: Client Management Tools Leader
2015 MQ
Endpoint Protection Platforms (EPP) Visionary
2014 MQ
Strong Performer
2013
Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader
2015 MQ
Leader
2014
Leader
2014 MS
Consulting and
Managed Services
Managed Security Services (MSS) Leader
2014 MQ (NA, WW)
Leader
2014 (NA)
Leader
2014 MS
Information Security Consulting Services Leader
2013
Public Cloud Service Providers’ Security (IBM Bluemix)
Strong Contender
2014
4© 2015 IBM Corporation
monitored countries (MSS)
service delivery experts
devices under contract
+
endpoints protected
+
events managed per day
+
IBM Security by the Numbers
+
+
IBM Security has global reach
© 2015 IBM Corporation
IBM MobileFirst Protect (MaaS360)
Total Enterprise Mobility:
“BYOD, Managing and Securing Mobile Devices”
6© 2015 IBM Corporation
Image credit: Reuters via Business Insider
2005
7© 2015 IBM Corporation
Image credit: Reuters via Business Insider
2014
8© 2015 IBM Corporation
Mobile
changes the way
people work
Mobile
provides a better
experience
Mobile
creates risk of
company data
Mobile is strategic for business
9© 2015 IBM Corporation
Mobile is complex and challenging to manage
Mobile
mixes personal
and work
Mobile
lives outside
your perimeter
Mobile
is fast-paced and
multi-platform
10© 2015 IBM Corporation
What IT and security pros are saying
“How do I ensure all devices
accessing our network are
secured and encrypted?”
“How do I enable my workforce
with the right apps and user
experience at the right time?”
Maximize Productivity Amplify Protection
“How do I manage the rapid
deployment of devices in a cost-
effectiveway?”
“How do I tie in to all my existing
systems? I need to protect my
investment!”
“How do I ensure authorized
access to customer data and
protect against threats?”
“How do I show that we are
compliant with our policies and
industry regulations?”
AND
CIO CISO
11© 2015 IBM Corporation
Threats from Malware and Mobile Devices
12© 2015 IBM Corporation
Rich in Features: One Platform, One Vendor for All Mobile
Needs
IBM MobileFirst Protect (MaaS360) Standard Offerings:
– Advance Mobile Management (AMM): Core Mobile
Management
• Mobile Device Management
• Mobile Application Management
• Expense Management
– Secure Productivity Suite (SPS):Secure Mobile Containers
• Secure Email Management
• Secure Web Management
• Secure App Management
– Secure Document Sharing (SDS): Secure Content
Collaboration
• Secure Document Viewer
• Secure Document Edit
• Secure Document Sync
– Mobile Enterprise Gateway (MEG): Seamless Enterprise
Access
• Enterprise Gateway for Secure Browser
• Enterprise Gateway for Docs
• Enterprise Gateway for Apps
– Mobile Malware Protect
• Threat Management
13© 2015 IBM Corporation
Mobile Device Management
• Manage smartphones, tablets & laptops featuring iOS, Android,
Windows Phone, BlackBerry, Windows PC & OS X
• Gain complete visibility of devices, security & network
• Enforce compliance with real-time & automated actions
Mobile Expense Management
• Monitor mobile data usage with real-time alerts
• Set policies to restrict or limit data & voice roaming
• Review integrated reporting and analytics
Mobile Application Management
• Deploy custom enterprise app catalogs
• Blacklist, whitelist & require apps
• Administer app volume purchase programs
MaaS360 Advanced Mobile Management
14© 2015 IBM Corporation
 Secure Mail
 Application Security
 Secure Browser
 Secure Document Sharing
WorkPlace Container for Mobile Collaboration
Dual Persona to Separate Work and Personal
15© 2015 IBM Corporation
Secure Browser
• Enable secure access to intranet sites & web apps w/o VPN
• Define URL filters based on categories & whitelisted sites
• Restrict cookies, downloads, copy/paste & print features
MaaS360 Secure Productivity Suite
Secure Mail
• Contain email text & attachments to prevent data leakage
• Enforce authentication, copy/paste & forwarding restrictions
• FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Application Security
• Contain enterprise apps with a simple app wrapper or SDK
• Enforce authentication & copy/paste restrictions
• Prevent access from compromised devices
16© 2015 IBM Corporation
Secure Editor
• Create, edit & save content in a secure, encrypted container
• Collaborate on Word, Excel, PowerPoint & text files
• Change fonts & insert images, tables, shapes, links & more
MaaS360 Secure Document Sharing
Mobile Content Management
• Contain documents & files to prevent data leakage
• Enforce authentication, copy/paste & view-only restrictions
• Access MaaS360 distributed content & repositories such as
SharePoint, Box & Google Drive
Secure Document Sync
• Synchronize user content across managed devices
• Restrict copy/paste & opening in unmanaged apps
• Store content securely, both in the cloud & on devices
17© 2015 IBM Corporation
Mobile Enterprise Gateway for Docs
• Enhance MaaS360 Mobile Content Management with secure
access to internal files, e.g. SharePoint & Windows File Share
• Retrieve enterprise documents without a device VPN session
Mobile Enterprise Gateway for Browser
• Enable MaaS360 Secure Browser to access enterprise intranet
sites, web apps & network resources
• Access seamlessly & securely without needing a VPN session
on mobile device
Mobile Enterprise Gateway for Apps
• Add in-app VPN to MaaS360 Application Security to integrate
behind-the-firewall data in enterprise apps
• Incorporate enterprise data without a device VPN session
MaaS360 Mobile Enterprise Gateway
18© 2015 IBM Corporation
Integrated Threat Management powered by industry leading Trusteer technology
MaaS360 combines the mobile risk assessment capabilities of
Trusteer with the real-time control of MaaS360-based EMM in a
fully integrated solution
 Mobile malware detection detects known malicious files based on their MD5s
 Rogue app detection identifies potentially malicious apps based on permission analysis
 Cloud-based threat intelligence to augment device context analysis with information such as last known location
MaaS360 Threat Management
19© 2015 IBM Corporation
MaaS360 Dashboard & Reporting
20© 2015 IBM Corporation
MaaS360
Personal Work Mail Content
MaaS360
File Sharing
MaaS360
Editor Intranet
MaaS360 Powers User Productivity
21© 2015 IBM Corporation
Mobilize Apps & Content
on Corporate Networks
Integrate with Existing
Enterprise Systems
File Systems
Web
Services
Lotus Traveler
Certificates
Office 365
Exchange
ActiveSync
Active
Directory/LDAP
Network/Intranet
Box
Google Drive
SharePoint
Cloud
Extender™
Mobile Enterprise
Gateway™
IBM
Connections
CMIS
Web Services
APIs
Integrate with External Systems
Dashboard
Portal
Admin View
Seamless Enterprise Integration
22© 2015 IBM Corporation
True SaaS Multi-tenancy
Lightening fast deployment
Zero added infrastructure
Zero maintenance
All inclusive pricing
Unlimited scalability
Pay as you go
Effortlessly keep up with the
pace of change in mobility
×Difficult and lengthy deployment
×Heavy infrastructure
×Constant maintenance and upgrades
Traditional Appliance Based
Advantages of a Cloud Based EMM Model
23© 2015 IBM Corporation
IBM enabled MaaS360 for internal
use 5 days after acquisition close
Users migrated
in one month
Users registered
within 24 hours
Users registered
in 15 days
Devices enrolled
per minute*
*at high point
Help Desk calls –
less than ½ of 1%
IBM Deploys MaaS360
24© 2015 IBM Corporation
Strong adoption in the enterprise
Manufacturing Consumer OthersPublicHealthcare Financial
25© 2015 IBM Corporation
Industry analyst opinions
“Leader” in the Magic Quadrant
Enterprise Mobility Management Suites for 4 years
“Best-in-class cloud” among ranked EMM vendors
“Leader” in the 2014 Forrester Wave for
Enterprise Mobile Management
“Highest” in Current Offering
“Champion” in the 2015 Enterprise Mobility
Management Vendor Landscape Report
“Highest Value Score” of the vendor group.
“Leader” Worldwide Enterprise Mobility Management
Software 2014 Vendor Assessment
26© 2015 IBM Corporation
26
Email with one-time passcode + custom URL + QR codeSMS text message and/or
Simple Enrollment
27© 2015 IBM Corporation
Get Started Now
maas360.com
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices,
emails, apps and
docs
Easy
Set up and
configure your
service in minutes
1 2 3
© 2015 IBM Corporation
Managed Service Providers Mobile Device
Security Offering
Powered by IBM MObileFirst Protect (MaaS360)
29© 2015 IBM Corporation
Market Opportunity - Worldwide EMM Market Size Forecasts
30© 2015 IBM Corporation
Why buying Mobile Device Security from MSP is better than
DIY for business customers
31© 2015 IBM Corporation
IBM MobileFirst Protect Partnership with other
Telecommunications providers
 Sell-through
– O2, Verizon Wireless
 Sell-with
– Verizon Wireless
 Managed Service
– Cisco, Daisy, Olive
 Bundled
– Cisco, Forescout
32© 2015 IBM Corporation
– Model: Sell-through partnership, Co-branded
– GTM: Self-Service & Managed Service, Sales
Overlay, Add-on Services
– Support: O2 does 1st and 2nd level
– Deployment: MobileFirst Protect Public Cloud
– Model: Sell-with / Sell-through partnership with
Verizon
– GTM: Enable Sales Teams/Resellers, Leads
Pass-through, Billing integration
– Deployment: MobileFirst Protect Public Cloud
– Support: MobileFirst Protect
IBM MobileFirst Protect Successful Partnership
33© 2015 IBM Corporation
Fully Brandable and Localizable
 Branding
– Self-service partner branding of portal
• Logo, Product name, Favicon, Copyright, URLs, Email Sender,
Contact and support information
– Trial registration page
• Logo, lead notification recipient
– End user apps
• Custom development may be required
 Localization
– MaaS360 Portal and Apps
• English, German, Spanish, French, Italian, , Portuguese, Dutch,
Russian, Japanese, Korean, Chinese (Simplified and Traditional)
33
34© 2015 IBM Corporation
MaaS360 Public
Platform
• Hosted at maas360.com
• Multi-tenant / Shared
• Multi-tiered / Brandable
• Zero infrastructure
• Hosted at SoftLayer
• Single-tenant / Private
• Multi-tiered / Brandable
• Zero infrastructure
• Hosting and setup fees
required
• 3 reference architectures
• < 100,000 devices
• 100K – 250K
• 250K – 1M
• Hosted at Partner
• Single-tenant / Private
• Multi-tiered / Brandable
• Infrastructure required
• Setup fees required
• 3 reference architectures
• < 100,000 devices
• 100K – 250K
• 250K – 1M
MaaS360 Hosted
Platform
MaaS360 On-Prem
Platform
IBM MobileFirst Protect (MaaS360) Deployment Models
35© 2015 IBM Corporation
Learn more about IBM Security
V2015-05-15
133 countries where IBM delivers
managed security services
24 industry analyst reports rank
IBM Security as a LEADER
TOP 3 enterprise security software
vendor in total revenue
12K clients protected including…
22 of the top 29 banks in Japan,
North America, and Europe
Visit our website
IBM Security Website
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security

Ibm mobile first protect (maas360)

  • 1.
    © 2015 IBMCorporation A New Era of Security for a New Era of Computing November 19, 2015 IBM Security
  • 2.
    2© 2015 IBMCorporation Expand the value of security solutions through integration Continuous actionable intelligence Consulting Services IBM X-Force Research Managed Services Trusteer Apex Endpoint zSecure BigFix Advanced Fraud Trusteer Pinpoint Trusteer Rapport Data Key Lifecycle Manager Guardium Suite Mobile MobileFirst Protect (MaaS360) MobileFirst Platform (Worklight) Network Network Protection XGS SiteProtector Applications AppScan Identity and Access Privileged Identity Manager Access Manager Identity Manager QRadar SIEM QRadar Log Manager QRadar Vulnerability Manager QRadar Incident Forensics QRadar Risk Manager Ecosystem Partners Trusteer Mobile Security Intelligence
  • 3.
    3© 2015 IBMCorporation IBM Security latest analyst report rankings Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23 Domain Market Segment / Report Gartner Magic Quadrant (MQ) Market Share (MS) Forrester Wave IDC Market Share (MS) MarketScape (MSc) Security Intelligence Security Information and Event Management (SIEM) Leader 2015 MQ / 2015 MS Leader 2015 MS Fraud Protection Web Fraud Detection (Trusteer) Leader 2013 MQ Identity and Access Management Federated Identity Management and Single Sign-On Leader 2013 MSc Identity and Access Governance Leader 2015 MQ / 2015 MS Strong Contender 2013 Identity and Access Management as a Service (IDaaS) Visionary 2015 MQ Web Access Management (WAM) Leader ‘13 MarketScope, ‘15 MS Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole Data Security Database Auditing and Real-Time Protection Leader 2011 Data Masking Leader 2014 MQ Application Security Application Security Testing (dynamic and static) Leader 2014 MQ / 2015 MS Leader 2014 Leader 2013 MS Network, Endpoint and Mobile Security Network Intrusion Prevention Systems (NIPS) Challenger 2014 MQ Endpoint: Client Management Tools Leader 2015 MQ Endpoint Protection Platforms (EPP) Visionary 2014 MQ Strong Performer 2013 Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader 2015 MQ Leader 2014 Leader 2014 MS Consulting and Managed Services Managed Security Services (MSS) Leader 2014 MQ (NA, WW) Leader 2014 (NA) Leader 2014 MS Information Security Consulting Services Leader 2013 Public Cloud Service Providers’ Security (IBM Bluemix) Strong Contender 2014
  • 4.
    4© 2015 IBMCorporation monitored countries (MSS) service delivery experts devices under contract + endpoints protected + events managed per day + IBM Security by the Numbers + + IBM Security has global reach
  • 5.
    © 2015 IBMCorporation IBM MobileFirst Protect (MaaS360) Total Enterprise Mobility: “BYOD, Managing and Securing Mobile Devices”
  • 6.
    6© 2015 IBMCorporation Image credit: Reuters via Business Insider 2005
  • 7.
    7© 2015 IBMCorporation Image credit: Reuters via Business Insider 2014
  • 8.
    8© 2015 IBMCorporation Mobile changes the way people work Mobile provides a better experience Mobile creates risk of company data Mobile is strategic for business
  • 9.
    9© 2015 IBMCorporation Mobile is complex and challenging to manage Mobile mixes personal and work Mobile lives outside your perimeter Mobile is fast-paced and multi-platform
  • 10.
    10© 2015 IBMCorporation What IT and security pros are saying “How do I ensure all devices accessing our network are secured and encrypted?” “How do I enable my workforce with the right apps and user experience at the right time?” Maximize Productivity Amplify Protection “How do I manage the rapid deployment of devices in a cost- effectiveway?” “How do I tie in to all my existing systems? I need to protect my investment!” “How do I ensure authorized access to customer data and protect against threats?” “How do I show that we are compliant with our policies and industry regulations?” AND CIO CISO
  • 11.
    11© 2015 IBMCorporation Threats from Malware and Mobile Devices
  • 12.
    12© 2015 IBMCorporation Rich in Features: One Platform, One Vendor for All Mobile Needs IBM MobileFirst Protect (MaaS360) Standard Offerings: – Advance Mobile Management (AMM): Core Mobile Management • Mobile Device Management • Mobile Application Management • Expense Management – Secure Productivity Suite (SPS):Secure Mobile Containers • Secure Email Management • Secure Web Management • Secure App Management – Secure Document Sharing (SDS): Secure Content Collaboration • Secure Document Viewer • Secure Document Edit • Secure Document Sync – Mobile Enterprise Gateway (MEG): Seamless Enterprise Access • Enterprise Gateway for Secure Browser • Enterprise Gateway for Docs • Enterprise Gateway for Apps – Mobile Malware Protect • Threat Management
  • 13.
    13© 2015 IBMCorporation Mobile Device Management • Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC & OS X • Gain complete visibility of devices, security & network • Enforce compliance with real-time & automated actions Mobile Expense Management • Monitor mobile data usage with real-time alerts • Set policies to restrict or limit data & voice roaming • Review integrated reporting and analytics Mobile Application Management • Deploy custom enterprise app catalogs • Blacklist, whitelist & require apps • Administer app volume purchase programs MaaS360 Advanced Mobile Management
  • 14.
    14© 2015 IBMCorporation  Secure Mail  Application Security  Secure Browser  Secure Document Sharing WorkPlace Container for Mobile Collaboration Dual Persona to Separate Work and Personal
  • 15.
    15© 2015 IBMCorporation Secure Browser • Enable secure access to intranet sites & web apps w/o VPN • Define URL filters based on categories & whitelisted sites • Restrict cookies, downloads, copy/paste & print features MaaS360 Secure Productivity Suite Secure Mail • Contain email text & attachments to prevent data leakage • Enforce authentication, copy/paste & forwarding restrictions • FIPS 140-2 compliant, AES-256 bit encryption for data at rest Application Security • Contain enterprise apps with a simple app wrapper or SDK • Enforce authentication & copy/paste restrictions • Prevent access from compromised devices
  • 16.
    16© 2015 IBMCorporation Secure Editor • Create, edit & save content in a secure, encrypted container • Collaborate on Word, Excel, PowerPoint & text files • Change fonts & insert images, tables, shapes, links & more MaaS360 Secure Document Sharing Mobile Content Management • Contain documents & files to prevent data leakage • Enforce authentication, copy/paste & view-only restrictions • Access MaaS360 distributed content & repositories such as SharePoint, Box & Google Drive Secure Document Sync • Synchronize user content across managed devices • Restrict copy/paste & opening in unmanaged apps • Store content securely, both in the cloud & on devices
  • 17.
    17© 2015 IBMCorporation Mobile Enterprise Gateway for Docs • Enhance MaaS360 Mobile Content Management with secure access to internal files, e.g. SharePoint & Windows File Share • Retrieve enterprise documents without a device VPN session Mobile Enterprise Gateway for Browser • Enable MaaS360 Secure Browser to access enterprise intranet sites, web apps & network resources • Access seamlessly & securely without needing a VPN session on mobile device Mobile Enterprise Gateway for Apps • Add in-app VPN to MaaS360 Application Security to integrate behind-the-firewall data in enterprise apps • Incorporate enterprise data without a device VPN session MaaS360 Mobile Enterprise Gateway
  • 18.
    18© 2015 IBMCorporation Integrated Threat Management powered by industry leading Trusteer technology MaaS360 combines the mobile risk assessment capabilities of Trusteer with the real-time control of MaaS360-based EMM in a fully integrated solution  Mobile malware detection detects known malicious files based on their MD5s  Rogue app detection identifies potentially malicious apps based on permission analysis  Cloud-based threat intelligence to augment device context analysis with information such as last known location MaaS360 Threat Management
  • 19.
    19© 2015 IBMCorporation MaaS360 Dashboard & Reporting
  • 20.
    20© 2015 IBMCorporation MaaS360 Personal Work Mail Content MaaS360 File Sharing MaaS360 Editor Intranet MaaS360 Powers User Productivity
  • 21.
    21© 2015 IBMCorporation Mobilize Apps & Content on Corporate Networks Integrate with Existing Enterprise Systems File Systems Web Services Lotus Traveler Certificates Office 365 Exchange ActiveSync Active Directory/LDAP Network/Intranet Box Google Drive SharePoint Cloud Extender™ Mobile Enterprise Gateway™ IBM Connections CMIS Web Services APIs Integrate with External Systems Dashboard Portal Admin View Seamless Enterprise Integration
  • 22.
    22© 2015 IBMCorporation True SaaS Multi-tenancy Lightening fast deployment Zero added infrastructure Zero maintenance All inclusive pricing Unlimited scalability Pay as you go Effortlessly keep up with the pace of change in mobility ×Difficult and lengthy deployment ×Heavy infrastructure ×Constant maintenance and upgrades Traditional Appliance Based Advantages of a Cloud Based EMM Model
  • 23.
    23© 2015 IBMCorporation IBM enabled MaaS360 for internal use 5 days after acquisition close Users migrated in one month Users registered within 24 hours Users registered in 15 days Devices enrolled per minute* *at high point Help Desk calls – less than ½ of 1% IBM Deploys MaaS360
  • 24.
    24© 2015 IBMCorporation Strong adoption in the enterprise Manufacturing Consumer OthersPublicHealthcare Financial
  • 25.
    25© 2015 IBMCorporation Industry analyst opinions “Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years “Best-in-class cloud” among ranked EMM vendors “Leader” in the 2014 Forrester Wave for Enterprise Mobile Management “Highest” in Current Offering “Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report “Highest Value Score” of the vendor group. “Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
  • 26.
    26© 2015 IBMCorporation 26 Email with one-time passcode + custom URL + QR codeSMS text message and/or Simple Enrollment
  • 27.
    27© 2015 IBMCorporation Get Started Now maas360.com Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, emails, apps and docs Easy Set up and configure your service in minutes 1 2 3
  • 28.
    © 2015 IBMCorporation Managed Service Providers Mobile Device Security Offering Powered by IBM MObileFirst Protect (MaaS360)
  • 29.
    29© 2015 IBMCorporation Market Opportunity - Worldwide EMM Market Size Forecasts
  • 30.
    30© 2015 IBMCorporation Why buying Mobile Device Security from MSP is better than DIY for business customers
  • 31.
    31© 2015 IBMCorporation IBM MobileFirst Protect Partnership with other Telecommunications providers  Sell-through – O2, Verizon Wireless  Sell-with – Verizon Wireless  Managed Service – Cisco, Daisy, Olive  Bundled – Cisco, Forescout
  • 32.
    32© 2015 IBMCorporation – Model: Sell-through partnership, Co-branded – GTM: Self-Service & Managed Service, Sales Overlay, Add-on Services – Support: O2 does 1st and 2nd level – Deployment: MobileFirst Protect Public Cloud – Model: Sell-with / Sell-through partnership with Verizon – GTM: Enable Sales Teams/Resellers, Leads Pass-through, Billing integration – Deployment: MobileFirst Protect Public Cloud – Support: MobileFirst Protect IBM MobileFirst Protect Successful Partnership
  • 33.
    33© 2015 IBMCorporation Fully Brandable and Localizable  Branding – Self-service partner branding of portal • Logo, Product name, Favicon, Copyright, URLs, Email Sender, Contact and support information – Trial registration page • Logo, lead notification recipient – End user apps • Custom development may be required  Localization – MaaS360 Portal and Apps • English, German, Spanish, French, Italian, , Portuguese, Dutch, Russian, Japanese, Korean, Chinese (Simplified and Traditional) 33
  • 34.
    34© 2015 IBMCorporation MaaS360 Public Platform • Hosted at maas360.com • Multi-tenant / Shared • Multi-tiered / Brandable • Zero infrastructure • Hosted at SoftLayer • Single-tenant / Private • Multi-tiered / Brandable • Zero infrastructure • Hosting and setup fees required • 3 reference architectures • < 100,000 devices • 100K – 250K • 250K – 1M • Hosted at Partner • Single-tenant / Private • Multi-tiered / Brandable • Infrastructure required • Setup fees required • 3 reference architectures • < 100,000 devices • 100K – 250K • 250K – 1M MaaS360 Hosted Platform MaaS360 On-Prem Platform IBM MobileFirst Protect (MaaS360) Deployment Models
  • 35.
    35© 2015 IBMCorporation Learn more about IBM Security V2015-05-15 133 countries where IBM delivers managed security services 24 industry analyst reports rank IBM Security as a LEADER TOP 3 enterprise security software vendor in total revenue 12K clients protected including… 22 of the top 29 banks in Japan, North America, and Europe Visit our website IBM Security Website Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 36.
    © Copyright IBMCorporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security