Mobile Device Management: Security and Productivity with a Competitive Edge

18
The Mobility Management Advantage: Management, Security and Productivity with a Competitive Edge

Transcript of Mobile Device Management: Security and Productivity with a Competitive Edge

Page 1: Mobile Device Management: Security and Productivity with a Competitive Edge

The Mobility Management Advantage:

Management, Security and Productivity with a Competitive Edge

Page 2: Mobile Device Management: Security and Productivity with a Competitive Edge

Housekeeping items

Duration – 60 minutesSubmit your questions to all

panelists in the Q&A box located on the right-hand side of your screen

Page 3: Mobile Device Management: Security and Productivity with a Competitive Edge

Section A

Use Policy, Productivity, Collaboration, Device

Management, and Security

Securely enable apps and contenton any device, anytime, anywhere

Frank Picarello
Add "Securely"
Page 4: Mobile Device Management: Security and Productivity with a Competitive Edge

Presenters:Rob GrundlockRaymond MorrisChewie Wang

Page 5: Mobile Device Management: Security and Productivity with a Competitive Edge

Mobilechanges the way

people work

Mobileprovides a better

experience

Mobile creates risk to company data

Mobile is Strategic for Business

Page 6: Mobile Device Management: Security and Productivity with a Competitive Edge

What Businesses are Asking

“How do I ensure all devices accessing our network are secured and encrypted?”

“How do I enable my workforce with the right apps and user experience at the right time?”

Maximize Productivity Amplify Protection

“How do I manage the rapid deployment of devices in a cost-effective way?”

“How do I tie in to all my existing systems? I need to protect my investment!”

“How do I ensure authorized access to customer data and protect against threats?”

“How do I show that we are compliant with our policies and industry regulations?”

AND

Business 1 Business 2

Page 7: Mobile Device Management: Security and Productivity with a Competitive Edge

Mobile is complex and challenging to manage

Mobilemixes personal

and work

Mobilelives outside

your perimeter

Mobileis fast-paced and

multi-platform

Page 8: Mobile Device Management: Security and Productivity with a Competitive Edge

Mobile Trends

8

by 2017Mobile downloadswill increase to

268 billionGartner

by 2016The number of smartphone users worldwide will surpass

2 billioneMarketer

75%of mobile security breaches occur via appsGartner

Arxan

Top mobile devicesand apps hacked 97%

Android

87%iOS

Page 9: Mobile Device Management: Security and Productivity with a Competitive Edge

Perennial EMM Market Leader

9

“IBM’s complete portfolio paired with a strong partner and services organization gives it the breadth to tackle most customer challenges.”The Forrester Wave™: Enterprise Mobile Management, Q4 2015

“IBM's mature shared-processing multitenant architecture is the best-in-class cloud among ranked EMM vendors.”Gartner Magic Quadrant for Enterprise Mobility Management Suites 2015

Page 10: Mobile Device Management: Security and Productivity with a Competitive Edge

Awareness is Top Priority even in 2016

Increasing threat to Healthcare and Government

More complex threats through malware, apps, and breaches

Need for security is growing

Page 11: Mobile Device Management: Security and Productivity with a Competitive Edge

The Value of Effectively Managing a Mobile Device

• Manage and control devices in your network• Dual persona

Access corporate information Not personal information

Page 12: Mobile Device Management: Security and Productivity with a Competitive Edge

Balance of Security & Productivity

Page 13: Mobile Device Management: Security and Productivity with a Competitive Edge

Case StudiesMobile Security

A healthcare provider

Protects their mobile devices

ensuring HIPAA compliance; installed and integrated

with existing servers in just

90 minutes

IBM MaaS360

Mobile Productivity

A gaming andentertainment company

reduces customer wait time by

80%with tabletsusing a single

managed app to speedthe time to deliver foodand drinks to customers

IBM MaaS360

Page 14: Mobile Device Management: Security and Productivity with a Competitive Edge

Complete Mobility Management and Security

Secure Document SharingContent Collaboration

Mobile Threat ManagementMalware Protection

Mobile Enterprise GatewayEnterprise Access

Advanced ManagementVisibility & Control

Secure Productivity Suite Trusted Workplace

Page 15: Mobile Device Management: Security and Productivity with a Competitive Edge

Seamless Integration

Advanced ManagementVisibility & Control

Secure Productivity Suite Trusted Workplace

Secure Document SharingContent Collaboration

Mobile Threat ManagementMalware Protection

Mobile Enterprise GatewayEnterprise Access

BYODCorporate

Shared

Mail SystemsDirectoriesCertificatesFile share

Page 16: Mobile Device Management: Security and Productivity with a Competitive Edge

TeamLogic IT’s Complete Mobile Device Management

Integratedsolutions that connect seamlessly to your existing and external environments

Scalabledata security with intelligence for the volume, speed, and variability of mobile

Completemanagement of devices, apps, content and users from a single platform

Use PolicyStarts with an Acceptable Use Policy for Mobile Devices whether company issued or BYOD

Page 17: Mobile Device Management: Security and Productivity with a Competitive Edge

Get Started Now

Use PolicyDevelop a “Use Policy” that aligns to your HR practices and business goals

ManagementManage and secure your devices, apps and content without inhibiting business productivity and effectiveness

Define and AlignDetermine the appropriate technology and services to align and support your policy

1 2 3

Page 18: Mobile Device Management: Security and Productivity with a Competitive Edge

Thank You!