Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2015 IBM Corporation John Guidone Account Executive IBM Security 267-238-3407 IBM MaaS360.

Similar presentations


Presentation on theme: "© 2015 IBM Corporation John Guidone Account Executive IBM Security 267-238-3407 IBM MaaS360."— Presentation transcript:

1 © 2015 IBM Corporation John Guidone Account Executive IBM Security jguidone@us.ibm.com 267-238-3407 IBM MaaS360

2 2 © 2015 IBM Corporation Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access MaaS360

3 3 © 2015 IBM Corporation Top 5 reasons why IBM MaaS360 wins overall The BEST IT Company with an unmatched breadth & depth of mobile management, productivity & security  We have an entire division devoted to Enterprise Security  A number of integrations with IBM Security, including Trusteer, QRadar, BigFix and ISAM  IBM + Apple and IBM + Box partnerships and synergies “BEST-in-class Cloud” The BEST Customer Experience The Easiest EMM Solution to Deploy & Integrate The most comprehensive EMM Solutions  Our own, robust, user-friendly container solutions  Our own mobile malware solution with Mobile Threat Management

4 4 © 2015 IBM Corporation MaaS360 Across all Industries Manufacturing HealthcareConsumer FinancialPublicOthers

5 5 © 2015 IBM Corporation Forrester & Info-Tech - Best-in-Class Device Management Forrester: IBM is a Leader in the 2015 Forrester Wave Max Score in Deployment Info-Tech: Info-Tech: IBM Ranked #1 in 2015, “offers the most functionality for a price comparable to that of other top vendors”

6 6 © 2015 IBM Corporation 2015 Gartner Enterprise Mobility Management Critical Capabilities Scored #1 in SaaS Deployments & #1 in Unified Endpoint Management No other vendor scored #1 in more than one category IBM was recognized for it’s origins in laptop management and as the only solution with integrated Threat Management for anti-malware

7 7 © 2015 IBM Corporation

8 8 How Long Does it Take MaaS360 To Deploy? 24x7 customer support by phone, chat or email Sales & customer support at no additional charge Community, forums, blogs, webinars Fastest Time to Trust

9 9 © 2015 IBM Corporation Built on a Trusted and Secure Cloud On-demand and Multi-tenant Redundant Architecture Geographically Load Balanced Logical/Physical Security Disaster Recovery Data Encryption Standard Certifications

10 10 © 2015 IBM Corporation How MaaS360 Works

11 11 © 2015 IBM Corporation As Mobile Grows, Threats Grow In 2014 the number of mobile phones (7.3 billion) will exceed the number of people on the planet (7 billion) 1 138 billion apps were downloaded in 2014 2. By 2017 50% of employers will require BYOD 3. Mobile malware is growing. Malicious code is infecting >11.6 million mobile devices at any given time 4. Mobile devices and the apps we rely on are under attack. 97% and 87% of top paid Android and iOS apps have been hacked 5.

12 12 © 2015 IBM Corporation What 2015 Taught Us  Android platform continues to be exposed with more than 1.5 million malicious packages installed on mobile in Q3 (1.5x in Q2)  Android malware is now able to gain full remote control access  iOS had it’s largest malware attack in the history of the platform with XCodeGhost  Malware can now use “injections” to fool the device owners into providing credentials  Backdoors (accounted for 15% of all malware) can now download additional malware into the device and even root the machine without end user interaction

13 13 © 2015 IBM Corporation Criminals Attack the Weakest Link

14 14 © 2015 IBM Corporation Malware? Show Me The Data: xCodeGhost – 300 iOS Apps Hacked Stagefright – Hackers gain full access to Android OS Keyrider – 225,000 Jailbroken iOS Devices Hacked Gunpowder – Android malware, steals PII & makes payments “When triggered, the malware scans all of the smartphone’s data and sends it to the hacker via email” “Stagefright' Android bug is the 'worst ever discovered” “Vulnerabilities in Apple’s Mac OS and iOS that allows a malicious app to gain unauthorized access to other apps’ sensitive data such as passwords and tokens for iCloud, Mail….” “Millions upon millions of iPhone and iPad users were affected by a major App Store hack that was just uncovered”

15 15 © 2015 IBM Corporation Mobile Threat Management Detects, analyzes and remediates mobile risks delivering a new layer of security for Enterprise Mobility Management (EMM) with the integration of IBM Security Trusteer® to protect against:  Mobile malware  Suspicious system configurations  Compromised devices Video


Download ppt "© 2015 IBM Corporation John Guidone Account Executive IBM Security 267-238-3407 IBM MaaS360."

Similar presentations


Ads by Google