© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360
2 © 2015 IBM Corporation Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access MaaS360
3 © 2015 IBM Corporation Top 5 reasons why IBM MaaS360 wins overall The BEST IT Company with an unmatched breadth & depth of mobile management, productivity & security We have an entire division devoted to Enterprise Security A number of integrations with IBM Security, including Trusteer, QRadar, BigFix and ISAM IBM + Apple and IBM + Box partnerships and synergies “BEST-in-class Cloud” The BEST Customer Experience The Easiest EMM Solution to Deploy & Integrate The most comprehensive EMM Solutions Our own, robust, user-friendly container solutions Our own mobile malware solution with Mobile Threat Management
4 © 2015 IBM Corporation MaaS360 Across all Industries Manufacturing HealthcareConsumer FinancialPublicOthers
5 © 2015 IBM Corporation Forrester & Info-Tech - Best-in-Class Device Management Forrester: IBM is a Leader in the 2015 Forrester Wave Max Score in Deployment Info-Tech: Info-Tech: IBM Ranked #1 in 2015, “offers the most functionality for a price comparable to that of other top vendors”
6 © 2015 IBM Corporation 2015 Gartner Enterprise Mobility Management Critical Capabilities Scored #1 in SaaS Deployments & #1 in Unified Endpoint Management No other vendor scored #1 in more than one category IBM was recognized for it’s origins in laptop management and as the only solution with integrated Threat Management for anti-malware
7 © 2015 IBM Corporation
8 How Long Does it Take MaaS360 To Deploy? 24x7 customer support by phone, chat or Sales & customer support at no additional charge Community, forums, blogs, webinars Fastest Time to Trust
9 © 2015 IBM Corporation Built on a Trusted and Secure Cloud On-demand and Multi-tenant Redundant Architecture Geographically Load Balanced Logical/Physical Security Disaster Recovery Data Encryption Standard Certifications
10 © 2015 IBM Corporation How MaaS360 Works
11 © 2015 IBM Corporation As Mobile Grows, Threats Grow In 2014 the number of mobile phones (7.3 billion) will exceed the number of people on the planet (7 billion) billion apps were downloaded in By % of employers will require BYOD 3. Mobile malware is growing. Malicious code is infecting >11.6 million mobile devices at any given time 4. Mobile devices and the apps we rely on are under attack. 97% and 87% of top paid Android and iOS apps have been hacked 5.
12 © 2015 IBM Corporation What 2015 Taught Us Android platform continues to be exposed with more than 1.5 million malicious packages installed on mobile in Q3 (1.5x in Q2) Android malware is now able to gain full remote control access iOS had it’s largest malware attack in the history of the platform with XCodeGhost Malware can now use “injections” to fool the device owners into providing credentials Backdoors (accounted for 15% of all malware) can now download additional malware into the device and even root the machine without end user interaction
13 © 2015 IBM Corporation Criminals Attack the Weakest Link
14 © 2015 IBM Corporation Malware? Show Me The Data: xCodeGhost – 300 iOS Apps Hacked Stagefright – Hackers gain full access to Android OS Keyrider – 225,000 Jailbroken iOS Devices Hacked Gunpowder – Android malware, steals PII & makes payments “When triggered, the malware scans all of the smartphone’s data and sends it to the hacker via ” “Stagefright' Android bug is the 'worst ever discovered” “Vulnerabilities in Apple’s Mac OS and iOS that allows a malicious app to gain unauthorized access to other apps’ sensitive data such as passwords and tokens for iCloud, Mail….” “Millions upon millions of iPhone and iPad users were affected by a major App Store hack that was just uncovered”
15 © 2015 IBM Corporation Mobile Threat Management Detects, analyzes and remediates mobile risks delivering a new layer of security for Enterprise Mobility Management (EMM) with the integration of IBM Security Trusteer® to protect against: Mobile malware Suspicious system configurations Compromised devices Video