1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC &

Slides:



Advertisements
Similar presentations
© 2008 Oracle Corporation – Proprietary and Confidential.
Advertisements

© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
© 2014 Microsoft Corporation. All rights reserved.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
IBM Proof of Technology Putting your Business in Motion with IBM MobileFirst Tillo
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force Threat Intelligence Quarterly 2Q 2014 Diana Kelley Executive Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
Conditions and Terms of Use
© 2009 IBM Corporation ® IBM Lotus Notes and Domino Product Roadmap April 2009.
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
IBM Software Group ® Jazz Storage Service Thomas.
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
International Telecommunication Union New Delhi, India, December 2011 ITU Workshop on Standards and Intellectual Property Rights (IPR) Issues Philip.
IBM Software Group ® Process Sequence to call ProcessAdminService from browser Thomas.
OneDrive for Business Product recap and roadmap primer
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Receipts.
IBM Software Group AIM Enterprise Platform Software IBM z/Transaction Processing Facility Enterprise Edition © IBM Corporation 2005 TPF Users Group.
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage Supplier Returns.
Click to add text © 2012 IBM Corporation 1 InfoSphere Streams Streams Console Applications InfoSphere Streams Version 3.0 Warren Acker InfoSphere Streams.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Manage and Disposition Inventory Returns.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Inspect Material.
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
End User License Agreement Permission to use and redistribute this Document is granted, provided that (1) the below copyright notice appears in all copies.
1 © 2016 IBM Corporation. 2 Introduction  Since 1989 we have been the trusted partner to law firms and legal departments that want to define or improve.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
IBM Software Group ® Jazz Process Component —Process Template Management Thomas.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
European Mobility & Endpoint Security User Group.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Outthink threats The next era of security. Marc van Zadelhoff General Manager, IBM Security.
Office 365 Upsell Paths.
Connectivity to bank and sample account structure
The time to address enterprise mobility is now
Deployment Planning Services
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Office 365 is cloud-based productivity, hosted by Microsoft.
BigFix Patch for Linux Overview of the RHSM Download Plug-in and the Multiple-Package Baseline Installation feature Chuxin Zhao.
Protect sensitive information with Office 365 DLP
Understanding best practices in classifying sensitive data
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Integrating Data With Cognos
Prevent Costly Data Leaks from Microsoft Office 365
Go Off Grid ➔ Go Graph! Jason October 24, 2016
Application Delivery & MAM Policy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Automation in an XML Authoring Environment
Which is right for your business, Office 365 or Microsoft 365?
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Which is right for your business, Office 365 or Microsoft 365?
IBM Blockchain An Enterprise Deployment of a Distributed Consensus-based Transaction Log Ben Smith & Kostantinos Christidis 1 ©2016 IBM Corporation.
IBM Global Technology Services
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Put Treatment Cost Calculator to work for you and your employees
IBM OpenPages Developer WYNTK
Microsoft Data Insights Summit
Presentation transcript:

1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC & OS X Gain complete visibility of devices, security & network Enforce compliance with real-time & automated actions Mobile Expense Management Monitor mobile data usage with real-time alerts Set policies to restrict or limit data & voice roaming Review integrated reporting & analytics Mobile Application Management Deploy custom enterprise app catalogs Blacklist, whitelist & require apps Administer app volume purchase programs IBM MaaS360 Management Suite

2 © 2016 IBM Corporation Secure Mobile Browser Enable secure access to intranet sites & web apps w/o VPN Define URL filters based on categories & whitelisted sites Restrict cookies, downloads, copy/paste & print features Secure Mobile Mail Contain text & attachments to prevent data leakage Enforce authentication, copy/paste & forwarding restrictions FIPS compliant, AES-256 bit encryption for data at rest Mobile Application Security Contain enterprise apps with a simple app wrapper or SDK Enforce authentication & copy/paste restrictions Prevent access from compromised devices IBM MaaS360 Productivity Suite

3 © 2016 IBM Corporation Mobile Document Editor Create, edit & save content in a secure, encrypted container Collaborate on Word, Excel, PowerPoint & text files Change fonts & insert images, tables, shapes, links & more Mobile Content Management Contain documents & files to prevent data leakage Enforce authentication, copy/paste & view-only restrictions Access IBM MaaS360 distributed content & repositories such as SharePoint, Box, Google Drive & OneDrive Mobile Document Sync Synchronize user content across managed devices Restrict copy/paste & opening in unmanaged apps Store content securely, both in the cloud & on devices IBM MaaS360 Content Suite

4 © 2016 IBM Corporation Gateway for Browser Enable MaaS360 Secure Mobile Browser to access enterprise intranet sites, web apps & network resources Access seamlessly & securely without needing a VPN session on mobile device Gateway for Apps Add per app VPN to MaaS360 Mobile Application Security to integrate behind-the-firewall data in private apps Incorporate enterprise data without a device VPN session Gateway for Documents Enhance MaaS360 Mobile Content Management with secure access to internal files, e.g. SharePoint & Windows File Share Retrieve enterprise documents without a device VPN session IBM MaaS360 Gateway Suite

5 © 2016 IBM Corporation IBM MaaS360 Mobile Threat Management Combines the mobile risk assessment capabilities of IBM Trusteer with the real-time control of MaaS360 Enterprise Mobility Management  Detect, analyze and remediate Mobile malware and compromised devices  Automate remediation Near real-time compliance rules engine  Use over-the-air detection logic updates Take action on jailbroken and rooted devices

© Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. Legal notices and disclaimers