Ibm mobile first protect (maas360)
-
Upload
gule-mariam -
Category
Technology
-
view
822 -
download
2
Transcript of Ibm mobile first protect (maas360)
© 2015 IBM Corporation
A New Era of Securityfor a New Era of ComputingNovember 19, 2015
IBM Security
2© 2015 IBM Corporation
Expand the value of security solutions through integrationContinuous actionable intelligence
ConsultingServices
IBM X-Force Research
Managed Services
Trusteer Apex
Endpoint
zSecure
BigFix
AdvancedFraud
Trusteer Pinpoint
Trusteer Rapport
Data
Key Lifecycle Manager
Guardium Suite
Mobile
MobileFirst Protect(MaaS360)
MobileFirst Platform(Worklight)
Network
Network Protection XGS
SiteProtector
ApplicationsAppScan
Identityand Access
Privileged Identity Manager
Access Manager
Identity Manager
QRadar SIEM
QRadar Log ManagerQRadar Vulnerability Manager
QRadarIncident ForensicsQRadar RiskManager
Ecosystem Partners
Trusteer Mobile
Security Intelligence
3© 2015 IBM Corporation
IBM Security latest analyst report rankings
Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23
Domain Market Segment / ReportGartner
Magic Quadrant (MQ)Market Share (MS)
Forrester Wave
IDCMarket Share (MS) MarketScape (MSc)
Security Intelligence Security Information and Event Management (SIEM) Leader2015 MQ / 2015 MS
Leader2015 MS
Fraud Protection Web Fraud Detection (Trusteer) Leader2013 MQ
Identity and Access Management
Federated Identity Management and Single Sign-On
Leader2013 MSc
Identity and Access Governance Leader2015 MQ / 2015 MS
Strong Contender2013
Identity and Access Management as a Service (IDaaS) Visionary2015 MQ
Web Access Management (WAM) Leader‘13 MarketScope, ‘15 MS
Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan
Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole
Data SecurityDatabase Auditing and Real-Time Protection Leader
2011
Data Masking Leader2014 MQ
Application Security Application Security Testing (dynamic and static) Leader2014 MQ / 2015 MS
Leader2014
Leader2013 MS
Network, Endpoint and Mobile Security
Network Intrusion Prevention Systems (NIPS) Challenger2014 MQ
Endpoint: Client Management Tools Leader2015 MQ
Endpoint Protection Platforms (EPP) Visionary2014 MQ
Strong Performer2013
Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader2015 MQ
Leader2014
Leader2014 MS
Consulting and Managed Services
Managed Security Services (MSS) Leader2014 MQ (NA, WW)
Leader2014 (NA)
Leader2014 MS
Information Security Consulting Services Leader2013
Public Cloud Service Providers’ Security (IBM Bluemix) Strong Contender2014
4© 2015 IBM Corporation
monitored countries (MSS)
service delivery experts
devices under contract+
endpoints protected+
events managed per day+
IBM Security by the Numbers
+
+
IBM Security has global reach
© 2015 IBM Corporation
IBM MobileFirst Protect (MaaS360)Total Enterprise Mobility:“BYOD, Managing and Securing Mobile Devices”
8© 2015 IBM Corporation
Mobilechanges the way
people work
Mobileprovides a better
experience
Mobile creates risk of company data
Mobile is strategic for business
9© 2015 IBM Corporation
Mobile is complex and challenging to manage
Mobilemixes personal
and work
Mobilelives outside
your perimeter
Mobileis fast-paced and
multi-platform
10© 2015 IBM Corporation
What IT and security pros are saying
“How do I ensure all devices accessing our network are secured and encrypted?”
“How do I enable my workforce with the right apps and user experience at the right time?”
Maximize Productivity Amplify Protection
“How do I manage the rapid deployment of devices in a cost-effective way?”
“How do I tie in to all my existing systems? I need to protect my investment!”
“How do I ensure authorized access to customer data and protect against threats?”
“How do I show that we are compliant with our policies and industry regulations?”
AND
CIO CISO
12© 2015 IBM Corporation
Rich in Features: One Platform, One Vendor for All Mobile Needs
IBM MobileFirst Protect (MaaS360) Standard Offerings:– Advance Mobile Management (AMM): Core Mobile
Management• Mobile Device Management• Mobile Application Management• Expense Management
– Secure Productivity Suite (SPS):Secure Mobile Containers• Secure Email Management• Secure Web Management• Secure App Management
– Secure Document Sharing (SDS): Secure Content Collaboration• Secure Document Viewer• Secure Document Edit• Secure Document Sync
– Mobile Enterprise Gateway (MEG): Seamless Enterprise Access• Enterprise Gateway for Secure Browser• Enterprise Gateway for Docs• Enterprise Gateway for Apps
– Mobile Malware Protect• Threat Management
13© 2015 IBM Corporation
Mobile Device Management• Manage smartphones, tablets & laptops featuring iOS, Android,
Windows Phone, BlackBerry, Windows PC & OS X• Gain complete visibility of devices, security & network• Enforce compliance with real-time & automated actions
Mobile Expense Management• Monitor mobile data usage with real-time alerts• Set policies to restrict or limit data & voice roaming• Review integrated reporting and analytics
Mobile Application Management• Deploy custom enterprise app catalogs• Blacklist, whitelist & require apps• Administer app volume purchase programs
MaaS360 Advanced Mobile Management
14© 2015 IBM Corporation
Secure Mail
Application Security
Secure Browser
Secure Document Sharing
WorkPlace Container for Mobile Collaboration
Dual Persona to Separate Work and Personal
15© 2015 IBM Corporation
Secure Browser• Enable secure access to intranet sites & web apps w/o VPN• Define URL filters based on categories & whitelisted sites• Restrict cookies, downloads, copy/paste & print features
MaaS360 Secure Productivity Suite
Secure Mail• Contain email text & attachments to prevent data leakage• Enforce authentication, copy/paste & forwarding restrictions• FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Application Security• Contain enterprise apps with a simple app wrapper or SDK• Enforce authentication & copy/paste restrictions• Prevent access from compromised devices
16© 2015 IBM Corporation
Secure Editor• Create, edit & save content in a secure, encrypted container• Collaborate on Word, Excel, PowerPoint & text files• Change fonts & insert images, tables, shapes, links & more
MaaS360 Secure Document Sharing
Mobile Content Management• Contain documents & files to prevent data leakage• Enforce authentication, copy/paste & view-only restrictions• Access MaaS360 distributed content & repositories such as
SharePoint, Box & Google Drive
Secure Document Sync• Synchronize user content across managed devices• Restrict copy/paste & opening in unmanaged apps• Store content securely, both in the cloud & on devices
17© 2015 IBM Corporation
Mobile Enterprise Gateway for Docs• Enhance MaaS360 Mobile Content Management with secure
access to internal files, e.g. SharePoint & Windows File Share• Retrieve enterprise documents without a device VPN session
Mobile Enterprise Gateway for Browser• Enable MaaS360 Secure Browser to access enterprise intranet
sites, web apps & network resources• Access seamlessly & securely without needing a VPN session
on mobile device
Mobile Enterprise Gateway for Apps• Add in-app VPN to MaaS360 Application Security to integrate
behind-the-firewall data in enterprise apps• Incorporate enterprise data without a device VPN session
MaaS360 Mobile Enterprise Gateway
18© 2015 IBM Corporation
Integrated Threat Management powered by industry leading Trusteer technology
MaaS360 combines the mobile risk assessment capabilities of Trusteer with the real-time control of MaaS360-based EMM in a fully integrated solution
Mobile malware detection detects known malicious files based on their MD5s
Rogue app detection identifies potentially malicious apps based on permission analysis Cloud-based threat intelligence to augment device context analysis with information such as last known location
MaaS360 Threat Management
20© 2015 IBM Corporation
MaaS360
Personal Work Mail Content
MaaS360
File Sharing
MaaS360
Editor Intranet
MaaS360 Powers User Productivity
21© 2015 IBM Corporation
Mobilize Apps & Contenton Corporate Networks
Integrate with Existing Enterprise Systems
File Systems
Web Services
Lotus Traveler
Certificates
Office 365
Exchange ActiveSync
Active Directory/LDAP
Network/Intranet
Box
Google Drive
SharePoint
Cloud Extender™
Mobile EnterpriseGateway™
IBM Connections
CMIS
Web Services APIs
Integrate with External Systems
DashboardPortalAdmin View
Seamless Enterprise Integration
22© 2015 IBM Corporation
True SaaS Multi-tenancyLightening fast deploymentZero added infrastructureZero maintenanceAll inclusive pricingUnlimited scalabilityPay as you go
Effortlessly keep up with the pace of change in mobility
×Difficult and lengthy deployment×Heavy infrastructure×Constant maintenance and upgrades
Traditional Appliance Based
Advantages of a Cloud Based EMM Model
23© 2015 IBM Corporation
IBM enabled MaaS360 for internal use 5 days after acquisition close Users migrated
in one month
Users registered within 24 hours
Users registered in 15 days
Devices enrolled per minute*
*at high point
Help Desk calls –less than ½ of 1%
IBM Deploys MaaS360
24© 2015 IBM Corporation
Strong adoption in the enterprise
Manufacturing Consumer OthersPublicHealthcare Financial
25© 2015 IBM Corporation
Industry analyst opinions
“Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years
“Best-in-class cloud” among ranked EMM vendors
“Leader” in the 2014 Forrester Wave for Enterprise Mobile Management“Highest” in Current Offering
“Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report
“Highest Value Score” of the vendor group.
“Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
26© 2015 IBM Corporation
26
Email with one-time passcode + custom URL + QR codeSMS text message and/or
Simple Enrollment
27© 2015 IBM Corporation
Get Started Now
maas360.com
InstantAccess a free, fully functional trial for 30 days
MobileManage and secure your devices, emails, apps and docs
EasySet up and configure your service in minutes
1 2 3
© 2015 IBM Corporation
Managed Service Providers Mobile Device Security OfferingPowered by IBM MObileFirst Protect (MaaS360)
30© 2015 IBM Corporation
Why buying Mobile Device Security from MSP is better than DIY for business customers
31© 2015 IBM Corporation
IBM MobileFirst Protect Partnership with other Telecommunications providers
Sell-through– O2, Verizon Wireless
Sell-with– Verizon Wireless
Managed Service– Cisco, Daisy, Olive
Bundled– Cisco, Forescout
32© 2015 IBM Corporation
– Model: Sell-through partnership, Co-branded– GTM: Self-Service & Managed Service, Sales
Overlay, Add-on Services– Support: O2 does 1st and 2nd level– Deployment: MobileFirst Protect Public Cloud
– Model: Sell-with / Sell-through partnership with Verizon
– GTM: Enable Sales Teams/Resellers, Leads Pass-through, Billing integration
– Deployment: MobileFirst Protect Public Cloud– Support: MobileFirst Protect
IBM MobileFirst Protect Successful Partnership
33© 2015 IBM Corporation
Fully Brandable and Localizable Branding
– Self-service partner branding of portal• Logo, Product name, Favicon, Copyright, URLs, Email Sender,
Contact and support information– Trial registration page
• Logo, lead notification recipient– End user apps
• Custom development may be required
Localization– MaaS360 Portal and Apps
• English, German, Spanish, French, Italian, , Portuguese, Dutch,Russian, Japanese, Korean, Chinese (Simplified and Traditional)
33
34© 2015 IBM Corporation
MaaS360 Public Platform
• Hosted at maas360.com• Multi-tenant / Shared• Multi-tiered / Brandable• Zero infrastructure
• Hosted at SoftLayer• Single-tenant / Private• Multi-tiered / Brandable• Zero infrastructure• Hosting and setup fees
required
• 3 reference architectures• < 100,000 devices• 100K – 250K• 250K – 1M
• Hosted at Partner• Single-tenant / Private• Multi-tiered / Brandable• Infrastructure required• Setup fees required
• 3 reference architectures• < 100,000 devices• 100K – 250K• 250K – 1M
MaaS360 Hosted Platform
MaaS360 On-PremPlatform
IBM MobileFirst Protect (MaaS360) Deployment Models
35© 2015 IBM Corporation
Learn more about IBM Security
V2015-05-15
133 countries where IBM delivers managed security services
24 industry analyst reports rankIBM Security as a LEADER
TOP 3 enterprise security software vendor in total revenue
12K clients protected including…
22 of the top 29 banks in Japan, North America, and Europe
Visit our websiteIBM Security Website
Watch our videos on YouTubeIBM Security Channel
Read new blog postsSecurityIntelligence.com
Follow us on Twitter@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOUwww.ibm.com/security