Manage and Secure Your Mobile Enterprise

1,235 views

Published on

This presentation was given at the Mobile World Congress in Barcelona, earlier this year. It illustrates How to manage and secure your Mobile Enterprise. This presentation was given by Vijay Dheap, Product Manager IBM Mobile Security Solutions, Kimber Spradlin, Product Marketing Manager IBM Endpoint Manager, and Peter Tosto, Portfolio Strategist IBM GTS Managed Services.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,235
On SlideShare
0
From Embeds
0
Number of Embeds
325
Actions
Shares
0
Downloads
1
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Manage and Secure Your Mobile Enterprise

  1. 1. MANAGE & SECURE YOUR MOBILE ENTERPRISE Vijay Dheap, Product Manager IBM Mobile Security Solutions Kimber Spradlin, Product Marketing Manager IBM Endpoint Manager Peter Tosto, Portfolio Strategist IBM GTS Managed Services 1© 2012 IBM Corporation
  2. 2. Visualizing the Threats to Mobile Computing Insecure Mobile WiFi access points Malicious apps apps or web sites Lost devices Network attacks Web Internet sites Telecom Corporate Provider Intranet Compromised Attempts at or Rogue unauthorized Threat of access Devices Corporate Data Loss Gateway Mobile Bluetooth Device Connection 2© 2012 IBM Corporation
  3. 3. Mobile Management & Security: Spectrum of Requirements 3© 2012 IBM Corporation
  4. 4. Securing the Device Mobile apps Internet Web sites Corporate IntranetSecure endpointdevice and data 4 © 2012 IBM Corporation
  5. 5. IBM Endpoint Manager for Mobile Devices 5© 2012 IBM Corporation
  6. 6. IBM Hosted Mobile Device Security Management Hosted Mobile Device For Business Customers Security Enforce IT policies For Service Providers Protect against malware Monetize smartphone services Prevent data loss Capitalize on BYOD Reduce IT overhead Differentiate your offering Minimize development expense Turn-key solution for securing mobile devices 6© 2012 IBM Corporation
  7. 7. Enterprise Demand for Mobile Security 7© 2012 IBM Corporation
  8. 8. Network, Data and Access Security Mobile apps Web sites Internet Secure connectivity Corporate Intranet Protect access to enterprise applications and data 8© 2012 IBM Corporation
  9. 9. Application Layer Security Develop, test and deliver safe applications Mobile apps Web sites Internet Corporate Intranet 9© 2012 IBM Corporation
  10. 10. Mobile Security Intelligence Achieve Visibility and Enable Adaptive Security Posture Mobile apps Web sites Internet Corporate Intranet 10© 2012 IBM Corporation
  11. 11. IBM Mobile Management & Security: Taking a Holistic Approach  IBM Worklight  IBM AppScan  IBM QRadar Achieve Visibility and Enable Adaptive Security Posture Mobile apps Develop, test and deliver safe IBM Endpoint applications Manager for Mobile Web IBM WorkLight sites  IBM Mobile Connect  IBM Security Access Internet Manager Protect access to enterprise Secure connectivity applications and data Secure endpointdevice and data Corporate Intranet 11 © 2012 IBM Corporation
  12. 12. www.ibm.com/mobile-enterprise 12© 2012 IBM Corporation

×