Date post: | 15-Apr-2017 |
Category: |
Mobile |
Upload: | ibm-maas360 |
View: | 988 times |
Download: | 2 times |
© 2015 IBM Corporation
Elevate MaaS360 MDM to Secure Productivity A contained & productive work place for users on-the-go
Matt Shaver | Jimmy Tsang IBM Security August 20, 2015
IBM MobileFirst Protect
2 © 2015 IBM Corporation
Housekeeping items
Duration – 60 minutes Submit your questions to all
panelists in the Q&A box located in the bottom right corner of your screen
Recording and slides will be emailed to you tomorrow
3 © 2015 IBM Corporation
Introductions
Jimmy Tsang Dir of Product Marketing
IBM
Matt Shaver Customer Engineer
IBM
4 © 2015 IBM Corporation
Challenges with enterprise mobility
IBM MobileFirst Protect Productivity Suite
IBM MobileFirst Protect Gateway Suite
Demo
Q&A
Agenda
5 © 2015 IBM Corporation
Which email system do you currently support? (a) Exchange
(b) Lotus Traveler / SmartCloud
(c) Office 365
(d) Google Apps for Work / Gmail
(e) Other
Poll question
6 © 2015 IBM Corporation
Mobile changes the way
people work
Mobile provides a better
experience
Mobile creates risk of company data
Mobile is strategic for business
7 © 2015 IBM Corporation
Mobile is complex and challenging to manage
Mobile mixes personal
and work
Mobile lives outside
your perimeter
Mobile is fast-paced and
multi-platform
8 © 2015 IBM Corporation
What IT and security pros are saying
“How do I ensure all devices accessing our network are secured and encrypted?”
“How do I enable my workforce with the right apps and user experience at the right time?”
Maximize Productivity Amplify Protection
“How do I manage the rapid deployment of devices in a cost-effective way, esp. with BYOD?”
“How do I tie in to all my existing systems? I need to protect my investment!”
“How do I ensure authorized access to customer data and protect against threats?”
“How do I show that we are compliant with our policies and industry regulations?”
AND
CIO CISO
9 © 2015 IBM Corporation
Complete mobility management and security
Advanced Management Visibility & Control
Secure Document Sharing Content Collaboration
Mobile Threat Management Malware Protection
Mobile Enterprise Gateway Enterprise Access
Secure Productivity Suite Trusted Workplace
10 © 2015 IBM Corporation
Unleash end-user productivity
Secure PIM App Security & Management
File Sync, Edit & Share
Secure Browser
Trusted Workplace
Separates work & personal data with anytime access to corporate resources
Works across iOS, Android & Windows Phone platforms with a native user experience
Supports Microsoft, Google, IBM & other collaboration tools, apps & containers
11 © 2015 IBM Corporation
IBM MobileFirst Protect Secure Mail
Contains emails & attachments to prevent data leakage
FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Enforce authentication, cut & paste restrictions & view-only mode
Restrict forwarding, moving & screen captures
Conduct on-line & off-line compliance checks prior accessing email
An intuitive personal information management (PIM) app with email, calendar & contacts for iOS, Android & Windows Phone
12 © 2015 IBM Corporation
IBM MobileFirst Protect Browser
Allow access to corporate intranet sites & network without VPN (e.g. JIRA)
Define URL filters & security policies based on categories
Block known malicious websites Enforce whitelist exceptions Restrict cookies, downloads, copy/paste
& print features to prevent data leaks Disable native & 3rd party web browsers
A feature-rich web browser for secure access to intranet sites & compliance of content policies for iOS, Android & Windows Phone
13 © 2015 IBM Corporation
IBM MobileFirst Protect Application Security
Enable user authentication Stop access from compromised
devices Restrict cut/copy/paste Enforce file protection Limit data backup to iTunes Alert administrators of violations Take automated actions IBM MobileFirst Protect Market for
best-in-class apps from developers leveraging SDK
A mobile application container with full operational & security management to protect against data leaks for iOS & Android
Simple App Wrapper when deploying enterprise apps with MAM
or Robust Software Development Kit
(SDK) to integrate right in app code
14 © 2015 IBM Corporation
MaaS360 Market
Best-in-Class Enterprise Apps leveraging the SDK powered by MaaS360 Application Security http://www.maas360.com/partner-program/maas360-market/
15 © 2015 IBM Corporation
Secure Productivity Suite Trusted Workplace
Complete mobility management and security
Advanced Management Visibility & Control
Secure Document Sharing Content Collaboration
Mobile Threat Management Malware Protection
Mobile Enterprise Gateway Enterprise Access
16 © 2015 IBM Corporation
IBM MobileFirst Protect Gateway for Browser
Browse right from the IBM MobileFirst Protect Browser No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls No changes to your network or firewall security settings
Simple & secure access to enterprise intranet sites & legacy web apps on a mobile device
Enterprise Web Servers
Enterprise Apps
Intranet
Gateway
17 © 2015 IBM Corporation
IBM MobileFirst Protect Gateway for Apps
Secure per app VPN tunnel to internal data resources to enhance enterprise apps on a mobile device
Files
Content
Data
Gateway
Enable & distribute private apps with enterprise data, secured using IBM MobileFirst Protect Applications & IBM MobileFirst Protect Application Security
No need for user to initiate a device-level VPN connection No changes to your network or firewall security settings
18 © 2015 IBM Corporation
IBM MobileFirst Protect Gateway for Documents
Access document files & folders using IBM MobileFirst Protect Content Create, edit, save & share documents securely No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls
Seamless & secure access to internal SharePoint sites, Windows File Shares & other enterprise file stores on a mobile device
IBM Connections
CMIS
Internal SharePoint
Windows File Shares
Gateway
19 © 2015 IBM Corporation
Key benefits
Mobilize corporate information including emails, content and intranet
Securely support both BYOD and corporate devices – separate work from personal
Reduce the risk of sensitive data leakage of corporate information
Take automated actions to enforce compliance with security policies
20 © 2015 IBM Corporation
How do you currently provide access to your intranet sites on mobile devices?
(a) By having users initiate a device VPN session every time
(b) By using the MaaS360 gateway with the MaaS360 Secure Browser
(c) By using a third-party gateway with a browser
(d) We don’t currently provide access
Poll question
© 2015 IBM Corporation
Demo of the Secure Productivity Suite
22 © 2015 IBM Corporation
Enable apps and content with trust on any device, anytime, anywhere
Delivering mobile security for the way people work
23 © 2015 IBM Corporation
Seamless enterprise integration
Advanced Management Visibility & Control
Secure Productivity Suite Trusted Workplace
Secure Document Sharing Content Collaboration
Mobile Threat Management Malware Protection
Mobile Enterprise Gateway Enterprise Access
BYOD Corporate
Shared
Mail systems Directories Certificates File shares
Exchange
Lotus Traveler
Gmail
Office 365
Intranet
Web Apps
24 © 2015 IBM Corporation
Just reach out to your Account
Executive and we can turn it on
for you in the same day
Easy to enable the Secure Productivity Suite
25 © 2015 IBM Corporation
Would you like to be contacted about having the Secure Productivity Suite and/or Mobile Enterprise Gateway enabled in your environment? (a) Yes
(b) No
Poll question
26 © 2015 IBM Corporation
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU www.ibm.com/security
© 2015 IBM Corporation
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.
Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.
Legal notices and disclaimers