SlideShare a Scribd company logo
1 of 37
Cognitive unified endpoint management
2 IBM Security
Our mission:
Provide a cognitive approach to
enable endpoints, end users and
everything in between.
3 IBM Security
Traditional mobile device
management solutions were
built for a simpler time.
Today’s IT leaders
have bigger ambitions.
4 IBM Security
The Internet of Things
(IoT) is your next big
opportunity—or a
ticking time bomb.
5 IBM Security
Unified Endpoint Management (UEM)
is the first step to enable today’s enterprise ecosystem.
Devices and things People and identity Apps and content
6 IBM Security
1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017..
of companies will use artificial intelligence (AI) or
cognitive computing to analyze endpoint data by 2020.> 80%
Cognitive technology
helps you deliver on
their expectations.
They expect
convenience.
Your employees
are consumers.
+
Balance control, deliver on expectations
=
7 IBM Security
Cognitive technology gives IT and
Security leaders the power to see:
• What happened
• What can happen
• What should be done
All in the context of your environment.
8 IBM Security
Cognitive offers a new approach
• Digging through news & blogs randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best practices ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
9 IBM Security
Senior Product Manager, Enterprise Mobility
There is enormous potential in unified
endpoint management when you
incorporate cognitive technology like
Watson into MaaS360.
With this capability, we are able to get an
in-depth feel of our device landscape
instantly helping us make decisions faster
as to where we need to evolve the platform.
BRIAN JACOME
10 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Trusted Advisor
Augmented intelligence and cognitive computing
Actionable insights Contextual analytics
Apps and content People and identity
Apps Content Data Identity Threats Connectivity
Devices and things
Smartphones Tablets Laptops Wearables Internet of Things
01 02 03Technology Convergence Internet of Things Identity Management
Three trends reshaping mobility
12 IBM Security
Traditional client management Modern API management+
Technology convergence is changing the game
13 IBM Security
Manage device that
manages IoT device
Manage embedded
Android/Win10/Linux/
Android Things/Windows IoT device
Manage IoT gateway
to cloud or platform
Capitalizing on the Internet of Things
Secure apps that
manages IoT device
14 IBM Security
Identity Management is about convenience and security
Single sign-on & touch access
On-boarding of users
Identity federation with apps
Self-service request
Conditional access to trusted devices
Step-up & multi-factor authentication
Threat management with risk data
Interoperability with other ID providers
15 IBM Security
Do more than manage endpoints
Transform your
business with
Demo
17 IBM Security
Complete
UEM
of mobile devices,
laptops & things
Best-in-class
cloud
on a mature,
trusted platform
Open
platform
for integration with
leading IT systems
for actionable insights
& cognitive analytics
What sets IBM MaaS360 apart
Industry-best
user interfaces
for app catalogs &
workplace container
Dedicated to
your success
with 24x7x365 support
by chat, phone, email
18 IBM Security
Best-in-class cloud delivery model
Fast deployment
Simple, self-service
provisioning process
designed for maximum
configurability
Effortless scalability
Trial instantly becomes
production environment
with ability turn up new
devices, users, apps
Automatic upgrades
Continuously updated daily
with new capabilities
and same day OS support
for the latest platform
Cloud expertise
Dedicated team
supporting a mature
platform with unmatched
security certifications
Agility of the cloud for the pace of change in mobility
19 IBM Security
MaaS360 goes global to keep data local
Localized cloud presence to support in-country data requirements
IBM Cloud
40+ datacenter locations
IBM MaaS360
• 4 existing centers in US, Germany, Singapore
• 2 just built in India and France
• 8 additional centers to open in 2017-2018 across
Europe, Asia, North America and South America
20 IBM Security
Effortless scalability for any endpoint deployment
BYOD &
Corporate
Want the latest
devices & email
Business
Transformation
Enterprise & global
locations enabled
Apps &
Content
Multiple departments
& locations enabled
Multi-OS
Security
Single department &
location enabled
Sales
Sales
Operations
Marketing
Execs
Finance/HR
Engineering
Operations
Services
Sales
R&D
Marketing
21 IBM Security
Directory Services Email Systems Certificates/PKI
Network Access Content Repositories
Containers
IT Service Management Mobile App Platforms
App Reputation
Robust technology partner ecosystem
Mobile Threat Defense
22 IBM Security
Security
A United States federal
government agency protects
27,000+
endpoints
while AT&T helps provide a
private network experience.
Watch IBM CEO Ginni Rometty and
AT&T CEO Randall Stephenson
chat about our partnership
https://ibm.biz/BdiZRj
Productivity
A large, national airline increased
productivity of pilots by
50%
with tablets
and reduced their time to find information
and perform calculations by
90%
or to just 5 minutes
https://ibm.biz/BdiZgA
A commitment to customer success
23 IBM Security
Strong adoption in the enterprise
Manufacturing Consumer Public Others
Trusted by over 14,000 customers
Financial Healthcare
24 IBM Security
Recognized as a
Leader by major
industry analysts
25 IBM Security
with Watson – cognitive UEM editions
Solution Essentials Deluxe Premier Enterprise
Device Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
App Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
Patch and Update Management ✔ ✔ ✔ ✔
Identity Management ✔ ✔ ✔ ✔
Advisor ✔ ✔ ✔ ✔
Container App ✔ ✔ ✔ ✔
Mobile Expense Management ✔ ✔ ✔ ✔
Secure Mobile Mail ✔ ✔ ✔
Secure Mobile Chat ✔ ✔ ✔
OS VPN ✔ ✔
Secure Browser ✔ ✔
Gateway for Browser ✔ ✔
Content Management ✔ ✔
Gateway for Documents ✔ ✔
App Security ✔ ✔
Gateway for Apps ✔ ✔
Mobile Document Editor ✔
Mobile Document Sync ✔
Mobile Threat Management ✔
TeamViewer Remote Support O O O O
26 IBM Security
Next steps
Demo
Participate in a
deep-dive demo
with our experts
Deploy
Start managing and
securing your mobile
environment
Evaluate
Set up and
configure your
custom trial service
1 2 3
Appendix
COGNITIVE UEM EDITIONS
28 IBM Security
App Management
Deploy custom enterprise app catalogs
Blacklist, whitelist & require apps
Administer app volume purchase programs
Device Management
Manage smartphones, tablets & laptops
featuring iOS, Android, Windows 10
Mobile, Windows 7, Windows 10 &
macOS
Gain complete visibility of devices,
security & network
Enforce compliance with real-time &
automated actions
Essentials Edition – a great first step for cognitive UEM
Patch & Update Management
Identify & report on missing OS patches
Schedule distribution and installation of
Windows OS & macOS patches
Determine outstanding updates to third
party Windows and macOS applications,
like Java & Adobe
Identity Management
Single sign-on & touch access
Conditional access to trusted devices
Identity federation with apps
29 IBM Security
Container App
A separate, corporate mobile workplace
for iOS, Android & Windows
Productivity apps for work in one place
Data leak prevention controls to restrict
copy-paste & forwarding of content
Advisor
Boost user productivity by identifying policy and app deployment
enhancements
Discover security vulnerabilities & emerging threats to endpoints,
apps & data
Improve IT operational efficiency by applying best practices &
learning from industry & peer benchmarks
Essentials Edition – a great first step for cognitive UEM
Mobile Expense Management
Monitor mobile data usage with real-time alerts
Set policies to restrict or limit data & voice
roaming
Review integrated reporting & analytics
30 IBM Security
Deluxe Edition – add email and chat containerization
includes all solutions from Essentials Edition
Secure Mobile Mail
Contain emails, attachments & chat to prevent data leakage
Enforce authentication, copy/paste & forwarding restrictions
FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Secure Mobile Chat
Enhance on-the-go collaboration and productivity
Contain all chat mobile conversations and data
Establish quick connections via corporate directory lookup
31 IBM Security
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
Secure Browser
A feature-rich web browser for secure access to intranet sites
Define URL filters & security policies based on categories
Block known malicious websites
OS VPN
Preserves the native VPN experience for iOS and Android users
Leverages the hosted MaaS360 Certificate Authority to issue authentication certs
Deployed alongside your corporate VPN solution
Gateway for Browser
Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web
apps & network resources
Access seamlessly & securely without needing a VPN session on mobile device
32 IBM Security
Gateway for Documents
Secure access to internal files:
e.g., SharePoint & Windows File Share
Retrieve enterprise documents without a VPN
session
Content Management
Contain documents & files to prevent
data leakage
Enforce authentication, copy/paste &
view-only restrictions
Access distributed content/repositories:
SharePoint, Box, Google Drive &
OneDrive
App Security
Contain enterprise apps with a simple
app wrapper or SDK
Enforce authentication & copy/paste
restrictions
Prevent access from compromised
devices
Gateway for Apps
Add per app VPN to Application
Security to integrate behind-the-
firewall data in private apps
Incorporate enterprise data without a
device VPN session
Premier Edition – add critical productivity and security solutions
includes all solutions from Deluxe Edition
33 IBM Security
Enterprise Edition – the ultimate package for protection & productivity
includes all solutions from Deluxe Edition
Mobile Document Sync
Synchronize user content across managed devices
Restrict copy/paste & opening in unmanaged apps
Store content securely, both in the cloud & on devices
Mobile Document Editor
Create, edit & save content in a secure, encrypted container
Collaborate on Word, Excel, PowerPoint & text files
Change fonts & insert images, tables, shapes, links & more
Mobile Threat Management
Detect and analyze mobile malware on compromised devices
Automate remediation via near real-time compliance engine
Take action on jailbroken/rooted devices over-the-air
34 IBM Security
TeamViewer Remote Support for IBM MaaS360
• Connect in seconds to obtain real-world remote device views and perform remote control functions
• Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops
• Conduct remote device configurations, provisioning, remediation of connectivity issues and more
• Reduce the volume of IT help desk calls and
emailed requests for device support
• Increase productivity for IT administrators and end users
35 IBM Security
MaaS360 solutions packaging summary
Essentials Deluxe Premier Enterprise
Device Management* Includes all Essentials solutions Includes all Deluxe solutions Includes all Premier solutions
App Management* Secure Mobile Mail OS VPN Mobile Document Editor
Patch & Update Management Secure Mobile Chat Secure Browser Mobile Document Sync
Identity Management Gateway for Browser Mobile Threat Management
Advisor Content Management
Container App Gateway for Documents
Mobile Expense Management App Security
Gateway for Apps
Solutionsincluded
with Watson – cognitive UEM editions
*iOS, Android, Windows Mobile, Windows & macOS
36 IBM Security
Health Check
Services
1 day
Mobility Training
Workshop
3 days
Services options to achieve mobility success
Quick Start
Services
Time-to-Value
Services
Strategy ✔ ✔
Collaboration ✔ ✔
Integration ✔ ✔
Project Management ✔
Best Practices Setup ✔
Configuration & Testing ✔
Deployment Readiness ✔
End User Deployment ✔
Readiness Check ✔
Training & Knowledge Transfer ✔
Duration* (average) 6 days 90 days
* Dependent on client’s needs, products to deploy and on-site location.
Additional Services
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
https://www.youtube.com/user/ibmse
curitysolutions
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

More Related Content

What's hot

Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
IBM Security
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
Arrow ECS UK
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
calebbarlow
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 

What's hot (20)

Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
BlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: FeaturesBlackBerry Enterprise Mobility Suite: Features
BlackBerry Enterprise Mobility Suite: Features
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 

Similar to MaaS360 with Watson

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
Arrow ECS UK
 

Similar to MaaS360 with Watson (20)

IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Symantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptxSymantec AppCenter Webinar.pptx
Symantec AppCenter Webinar.pptx
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
Softwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar PresentationSoftwerx Microsoft 365 Security Webinar Presentation
Softwerx Microsoft 365 Security Webinar Presentation
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBM
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

MaaS360 with Watson

  • 2. 2 IBM Security Our mission: Provide a cognitive approach to enable endpoints, end users and everything in between.
  • 3. 3 IBM Security Traditional mobile device management solutions were built for a simpler time. Today’s IT leaders have bigger ambitions.
  • 4. 4 IBM Security The Internet of Things (IoT) is your next big opportunity—or a ticking time bomb.
  • 5. 5 IBM Security Unified Endpoint Management (UEM) is the first step to enable today’s enterprise ecosystem. Devices and things People and identity Apps and content
  • 6. 6 IBM Security 1 A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017.. of companies will use artificial intelligence (AI) or cognitive computing to analyze endpoint data by 2020.> 80% Cognitive technology helps you deliver on their expectations. They expect convenience. Your employees are consumers. + Balance control, deliver on expectations =
  • 7. 7 IBM Security Cognitive technology gives IT and Security leaders the power to see: • What happened • What can happen • What should be done All in the context of your environment.
  • 8. 8 IBM Security Cognitive offers a new approach • Digging through news & blogs randomly • Manually searching in platform DISCOVER • Being alerted with insights & news • Asking questions, getting answers • Spending hours learning DEFINE • Getting knowledge served to you • Fumbling for relevancy & best practices ASSESS • Gaining instant understanding & recommendations • Developing an action plan ACT • Taking immediate action within context GO FROM TO
  • 9. 9 IBM Security Senior Product Manager, Enterprise Mobility There is enormous potential in unified endpoint management when you incorporate cognitive technology like Watson into MaaS360. With this capability, we are able to get an in-depth feel of our device landscape instantly helping us make decisions faster as to where we need to evolve the platform. BRIAN JACOME
  • 10. 10 IBM Security IBM MaaS360 with Watson for cognitive UEM Trusted Advisor Augmented intelligence and cognitive computing Actionable insights Contextual analytics Apps and content People and identity Apps Content Data Identity Threats Connectivity Devices and things Smartphones Tablets Laptops Wearables Internet of Things
  • 11. 01 02 03Technology Convergence Internet of Things Identity Management Three trends reshaping mobility
  • 12. 12 IBM Security Traditional client management Modern API management+ Technology convergence is changing the game
  • 13. 13 IBM Security Manage device that manages IoT device Manage embedded Android/Win10/Linux/ Android Things/Windows IoT device Manage IoT gateway to cloud or platform Capitalizing on the Internet of Things Secure apps that manages IoT device
  • 14. 14 IBM Security Identity Management is about convenience and security Single sign-on & touch access On-boarding of users Identity federation with apps Self-service request Conditional access to trusted devices Step-up & multi-factor authentication Threat management with risk data Interoperability with other ID providers
  • 15. 15 IBM Security Do more than manage endpoints Transform your business with
  • 16. Demo
  • 17. 17 IBM Security Complete UEM of mobile devices, laptops & things Best-in-class cloud on a mature, trusted platform Open platform for integration with leading IT systems for actionable insights & cognitive analytics What sets IBM MaaS360 apart Industry-best user interfaces for app catalogs & workplace container Dedicated to your success with 24x7x365 support by chat, phone, email
  • 18. 18 IBM Security Best-in-class cloud delivery model Fast deployment Simple, self-service provisioning process designed for maximum configurability Effortless scalability Trial instantly becomes production environment with ability turn up new devices, users, apps Automatic upgrades Continuously updated daily with new capabilities and same day OS support for the latest platform Cloud expertise Dedicated team supporting a mature platform with unmatched security certifications Agility of the cloud for the pace of change in mobility
  • 19. 19 IBM Security MaaS360 goes global to keep data local Localized cloud presence to support in-country data requirements IBM Cloud 40+ datacenter locations IBM MaaS360 • 4 existing centers in US, Germany, Singapore • 2 just built in India and France • 8 additional centers to open in 2017-2018 across Europe, Asia, North America and South America
  • 20. 20 IBM Security Effortless scalability for any endpoint deployment BYOD & Corporate Want the latest devices & email Business Transformation Enterprise & global locations enabled Apps & Content Multiple departments & locations enabled Multi-OS Security Single department & location enabled Sales Sales Operations Marketing Execs Finance/HR Engineering Operations Services Sales R&D Marketing
  • 21. 21 IBM Security Directory Services Email Systems Certificates/PKI Network Access Content Repositories Containers IT Service Management Mobile App Platforms App Reputation Robust technology partner ecosystem Mobile Threat Defense
  • 22. 22 IBM Security Security A United States federal government agency protects 27,000+ endpoints while AT&T helps provide a private network experience. Watch IBM CEO Ginni Rometty and AT&T CEO Randall Stephenson chat about our partnership https://ibm.biz/BdiZRj Productivity A large, national airline increased productivity of pilots by 50% with tablets and reduced their time to find information and perform calculations by 90% or to just 5 minutes https://ibm.biz/BdiZgA A commitment to customer success
  • 23. 23 IBM Security Strong adoption in the enterprise Manufacturing Consumer Public Others Trusted by over 14,000 customers Financial Healthcare
  • 24. 24 IBM Security Recognized as a Leader by major industry analysts
  • 25. 25 IBM Security with Watson – cognitive UEM editions Solution Essentials Deluxe Premier Enterprise Device Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ App Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ Patch and Update Management ✔ ✔ ✔ ✔ Identity Management ✔ ✔ ✔ ✔ Advisor ✔ ✔ ✔ ✔ Container App ✔ ✔ ✔ ✔ Mobile Expense Management ✔ ✔ ✔ ✔ Secure Mobile Mail ✔ ✔ ✔ Secure Mobile Chat ✔ ✔ ✔ OS VPN ✔ ✔ Secure Browser ✔ ✔ Gateway for Browser ✔ ✔ Content Management ✔ ✔ Gateway for Documents ✔ ✔ App Security ✔ ✔ Gateway for Apps ✔ ✔ Mobile Document Editor ✔ Mobile Document Sync ✔ Mobile Threat Management ✔ TeamViewer Remote Support O O O O
  • 26. 26 IBM Security Next steps Demo Participate in a deep-dive demo with our experts Deploy Start managing and securing your mobile environment Evaluate Set up and configure your custom trial service 1 2 3
  • 28. 28 IBM Security App Management Deploy custom enterprise app catalogs Blacklist, whitelist & require apps Administer app volume purchase programs Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows 10 Mobile, Windows 7, Windows 10 & macOS Gain complete visibility of devices, security & network Enforce compliance with real-time & automated actions Essentials Edition – a great first step for cognitive UEM Patch & Update Management Identify & report on missing OS patches Schedule distribution and installation of Windows OS & macOS patches Determine outstanding updates to third party Windows and macOS applications, like Java & Adobe Identity Management Single sign-on & touch access Conditional access to trusted devices Identity federation with apps
  • 29. 29 IBM Security Container App A separate, corporate mobile workplace for iOS, Android & Windows Productivity apps for work in one place Data leak prevention controls to restrict copy-paste & forwarding of content Advisor Boost user productivity by identifying policy and app deployment enhancements Discover security vulnerabilities & emerging threats to endpoints, apps & data Improve IT operational efficiency by applying best practices & learning from industry & peer benchmarks Essentials Edition – a great first step for cognitive UEM Mobile Expense Management Monitor mobile data usage with real-time alerts Set policies to restrict or limit data & voice roaming Review integrated reporting & analytics
  • 30. 30 IBM Security Deluxe Edition – add email and chat containerization includes all solutions from Essentials Edition Secure Mobile Mail Contain emails, attachments & chat to prevent data leakage Enforce authentication, copy/paste & forwarding restrictions FIPS 140-2 compliant, AES-256 bit encryption for data at rest Secure Mobile Chat Enhance on-the-go collaboration and productivity Contain all chat mobile conversations and data Establish quick connections via corporate directory lookup
  • 31. 31 IBM Security Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition Secure Browser A feature-rich web browser for secure access to intranet sites Define URL filters & security policies based on categories Block known malicious websites OS VPN Preserves the native VPN experience for iOS and Android users Leverages the hosted MaaS360 Certificate Authority to issue authentication certs Deployed alongside your corporate VPN solution Gateway for Browser Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web apps & network resources Access seamlessly & securely without needing a VPN session on mobile device
  • 32. 32 IBM Security Gateway for Documents Secure access to internal files: e.g., SharePoint & Windows File Share Retrieve enterprise documents without a VPN session Content Management Contain documents & files to prevent data leakage Enforce authentication, copy/paste & view-only restrictions Access distributed content/repositories: SharePoint, Box, Google Drive & OneDrive App Security Contain enterprise apps with a simple app wrapper or SDK Enforce authentication & copy/paste restrictions Prevent access from compromised devices Gateway for Apps Add per app VPN to Application Security to integrate behind-the- firewall data in private apps Incorporate enterprise data without a device VPN session Premier Edition – add critical productivity and security solutions includes all solutions from Deluxe Edition
  • 33. 33 IBM Security Enterprise Edition – the ultimate package for protection & productivity includes all solutions from Deluxe Edition Mobile Document Sync Synchronize user content across managed devices Restrict copy/paste & opening in unmanaged apps Store content securely, both in the cloud & on devices Mobile Document Editor Create, edit & save content in a secure, encrypted container Collaborate on Word, Excel, PowerPoint & text files Change fonts & insert images, tables, shapes, links & more Mobile Threat Management Detect and analyze mobile malware on compromised devices Automate remediation via near real-time compliance engine Take action on jailbroken/rooted devices over-the-air
  • 34. 34 IBM Security TeamViewer Remote Support for IBM MaaS360 • Connect in seconds to obtain real-world remote device views and perform remote control functions • Provide rapid IT support for iOS and Android devices and Microsoft Windows laptops and desktops • Conduct remote device configurations, provisioning, remediation of connectivity issues and more • Reduce the volume of IT help desk calls and emailed requests for device support • Increase productivity for IT administrators and end users
  • 35. 35 IBM Security MaaS360 solutions packaging summary Essentials Deluxe Premier Enterprise Device Management* Includes all Essentials solutions Includes all Deluxe solutions Includes all Premier solutions App Management* Secure Mobile Mail OS VPN Mobile Document Editor Patch & Update Management Secure Mobile Chat Secure Browser Mobile Document Sync Identity Management Gateway for Browser Mobile Threat Management Advisor Content Management Container App Gateway for Documents Mobile Expense Management App Security Gateway for Apps Solutionsincluded with Watson – cognitive UEM editions *iOS, Android, Windows Mobile, Windows & macOS
  • 36. 36 IBM Security Health Check Services 1 day Mobility Training Workshop 3 days Services options to achieve mobility success Quick Start Services Time-to-Value Services Strategy ✔ ✔ Collaboration ✔ ✔ Integration ✔ ✔ Project Management ✔ Best Practices Setup ✔ Configuration & Testing ✔ Deployment Readiness ✔ End User Deployment ✔ Readiness Check ✔ Training & Knowledge Transfer ✔ Duration* (average) 6 days 90 days * Dependent on client’s needs, products to deploy and on-site location. Additional Services
  • 37. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity https://www.youtube.com/user/ibmse curitysolutions © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU