© 2015 IBM Corporation John Guidone Account Executive IBM Security 267-238-3407 IBM MaaS360.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Security for Today’s Threat Landscape Kat Pelak 1.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
IBM Proof of Technology Putting your Business in Motion with IBM MobileFirst Tillo
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Dell Connected Security Solutions Simplify & unify.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Synchronized Security Revolutionizing Advanced Threat Protection
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
Building a Fully Trusted Authentication Environment
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
About Us Vulsec’s security experts deliver versatile tactics tailored to arm your IT department in the fight against hackers. We assess your organization.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Data Protection and Governance at the Edge September 2014.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
What Are the Different Platforms for Enterprise Mobility Solutions?
Total Enterprise Mobility Comprehensive Management and Security
Unified Endpoint Management and Security Mobile Device Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
OFFICE 365 APP BUILDER PROFILE: Druva
Sophos Mobile Control Joanna Wziątek-Ładosz Sales Engineer, Sophos.
The time to address enterprise mobility is now
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Mobile Data Solutions Inc
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Security managed from the cloud.
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Contextual Intelligence Platform Delivers Rich, Interactive Add-Ins to Microsoft Office and Brings Users Efficiency, Quick Access to Valuable Data MICROSOFT.
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Securely run and grow your business with Microsoft 365 Business
Data Security for Microsoft Azure
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Securing the Threats of Tomorrow, Today.
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
Powerful Partnerships with Industry Leaders
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
IT Management, Simplified
Cybersecurity Simplified: Ransomware
Presentation transcript:

© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360

2 © 2015 IBM Corporation Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access MaaS360

3 © 2015 IBM Corporation Top 5 reasons why IBM MaaS360 wins overall The BEST IT Company with an unmatched breadth & depth of mobile management, productivity & security  We have an entire division devoted to Enterprise Security  A number of integrations with IBM Security, including Trusteer, QRadar, BigFix and ISAM  IBM + Apple and IBM + Box partnerships and synergies “BEST-in-class Cloud” The BEST Customer Experience The Easiest EMM Solution to Deploy & Integrate The most comprehensive EMM Solutions  Our own, robust, user-friendly container solutions  Our own mobile malware solution with Mobile Threat Management

4 © 2015 IBM Corporation MaaS360 Across all Industries Manufacturing HealthcareConsumer FinancialPublicOthers

5 © 2015 IBM Corporation Forrester & Info-Tech - Best-in-Class Device Management Forrester: IBM is a Leader in the 2015 Forrester Wave Max Score in Deployment Info-Tech: Info-Tech: IBM Ranked #1 in 2015, “offers the most functionality for a price comparable to that of other top vendors”

6 © 2015 IBM Corporation 2015 Gartner Enterprise Mobility Management Critical Capabilities Scored #1 in SaaS Deployments & #1 in Unified Endpoint Management No other vendor scored #1 in more than one category IBM was recognized for it’s origins in laptop management and as the only solution with integrated Threat Management for anti-malware

7 © 2015 IBM Corporation

8 How Long Does it Take MaaS360 To Deploy? 24x7 customer support by phone, chat or Sales & customer support at no additional charge Community, forums, blogs, webinars Fastest Time to Trust

9 © 2015 IBM Corporation Built on a Trusted and Secure Cloud On-demand and Multi-tenant Redundant Architecture Geographically Load Balanced Logical/Physical Security Disaster Recovery Data Encryption Standard Certifications

10 © 2015 IBM Corporation How MaaS360 Works

11 © 2015 IBM Corporation As Mobile Grows, Threats Grow In 2014 the number of mobile phones (7.3 billion) will exceed the number of people on the planet (7 billion) billion apps were downloaded in By % of employers will require BYOD 3. Mobile malware is growing. Malicious code is infecting >11.6 million mobile devices at any given time 4. Mobile devices and the apps we rely on are under attack. 97% and 87% of top paid Android and iOS apps have been hacked 5.

12 © 2015 IBM Corporation What 2015 Taught Us  Android platform continues to be exposed with more than 1.5 million malicious packages installed on mobile in Q3 (1.5x in Q2)  Android malware is now able to gain full remote control access  iOS had it’s largest malware attack in the history of the platform with XCodeGhost  Malware can now use “injections” to fool the device owners into providing credentials  Backdoors (accounted for 15% of all malware) can now download additional malware into the device and even root the machine without end user interaction

13 © 2015 IBM Corporation Criminals Attack the Weakest Link

14 © 2015 IBM Corporation Malware? Show Me The Data: xCodeGhost – 300 iOS Apps Hacked Stagefright – Hackers gain full access to Android OS Keyrider – 225,000 Jailbroken iOS Devices Hacked Gunpowder – Android malware, steals PII & makes payments “When triggered, the malware scans all of the smartphone’s data and sends it to the hacker via ” “Stagefright' Android bug is the 'worst ever discovered” “Vulnerabilities in Apple’s Mac OS and iOS that allows a malicious app to gain unauthorized access to other apps’ sensitive data such as passwords and tokens for iCloud, Mail….” “Millions upon millions of iPhone and iPad users were affected by a major App Store hack that was just uncovered”

15 © 2015 IBM Corporation Mobile Threat Management Detects, analyzes and remediates mobile risks delivering a new layer of security for Enterprise Mobility Management (EMM) with the integration of IBM Security Trusteer® to protect against:  Mobile malware  Suspicious system configurations  Compromised devices Video