+ All Categories
Home > Mobile > Top 8 Reasons to Switch from MDM to EMM

Top 8 Reasons to Switch from MDM to EMM

Date post: 29-Jul-2015
Category:
Upload: maas360-by-fiberlink
View: 128 times
Download: 1 times
Share this document with a friend
Popular Tags:
34
© 2015 IBM Corporation Top 8 Reasons to Switch from MDM to EMM with IBM MobileFirst Protect (MaaS360) Brian Adams, John Nielsen, Jimmy Tsang IBM Security June 17, 2015
Transcript
Page 1: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

1 © 2015 IBM Corporation

Top 8 Reasons to Switch from MDM to EMM with IBM MobileFirst Protect (MaaS360)

Brian Adams, John Nielsen, Jimmy Tsang IBM Security June 17, 2015

Page 2: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

2

Introductions

Jimmy Tsang Product Marketing

IBM

Brian Adams Sales IBM

John Nielsen Product Management

IBM

Page 3: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

3

Agenda

Mobile trends in the enterprise

Top 8 reasons to switch from MDM to EMM

Demo

About IBM MobileFirst Protect

Q&A

Page 4: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

4

Poll question

Which MDM/EMM provider does your organization currently use?

A. MaaS360 / IBM MobileFirst Protect

B. AirWatch

C. MobileIron

D. Good Technology

E. Citrix

F. Microsoft

G. Other

H. None yet

Page 5: Top 8 Reasons to Switch from MDM to EMM

5 © 2015 IBM Corporation

Mobile trends in the enterprise

Page 6: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

6

Mobile devices are essential for business and personal

Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014

87% have their smartphone at their side, day and night

78% spend over 2 hours a day using their smartphone

80% say the first thing they do in the morning is reach for their smartphone

Millennials and their smartphones…

46% say their smartphone is something they couldn’t live without

Source: “6 facts about Americans and their smartphones” by Pew Research Center, April 2015

87% By 2017, mobile devices will make up

of Internet-enabled technology total sales Source: Lander Blog, “Five Online Marketing Trends for 2014, April 2014

Page 7: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

7

App explosion in the enterprise is here and now

In 2014, the overall mobile app usage grew 76% Source: Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015

the number of apps the average enterprise has deployed to its employees

Source: Magic Quadrant for Enterprise Mobility Management Suites, Gartner, June 2015

Source: Gartner Press Release, May 2014

of all mobile security breaches are through apps 75%

8-15

Page 8: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

8

Surging demand for Content and Collaboration

Source: “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014

59% allow employees to share or collaborate on documents if the company provides the mobile device

on employee’s personally owned mobile devices (BYOD) 38%

48% have a clear policy for the adoption and use of cloud-based file sharing/file sync and share apps

have clear visibility into the file sharing/file sync and share apps used by employees at work 49%

Page 9: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

9

Analysts continue to see big things for mobile in the enterprise

“Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.”

“IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.”

EMM is the "Glue" “EMM is the starting point, if you are planning to opt into managing anything on a mobile platform.”

“Enterprise mobility … new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.”

Page 10: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

10

Mobile changes the way

people work

Mobile provides a better

experience

Mobile creates risk of company data

Mobile is strategic for business

Page 11: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

11

Mobile is complex and challenging to manage

Mobile mixes personal

and work

Mobile lives outside

your perimeter

Mobile is fast-paced and

multi-platform

Page 12: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

12

What IT and security pros are saying

“How do I ensure all devices accessing our network are secured and encrypted?”

“How do I enable my workforce with the right apps and user experience at the right time?”

Maximize Productivity Amplify Protection

“How do I manage the rapid deployment of devices in a cost-effective way?”

“How do I tie in to all my existing systems? I need to protect my investment!”

“How do I ensure authorized access to customer data and protect against threats?”

“How do I show that we are compliant with our policies and industry regulations?”

AND

CIO CISO

Page 13: Top 8 Reasons to Switch from MDM to EMM

13 © 2015 IBM Corporation

Top 8 Reasons to Switch from MDM to EMM

Page 14: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

14

1. Use a single platform to manage devices, apps and content

Page 15: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

15

2. Integrate with existing enterprise systems and resources

File Systems

Web Apps

Lotus Traveler

Certificates

Office 365 Exchange ActiveSync

Active Directory/LDAP Network/Intranet

Box

Google Drive

SharePoint

IBM Connections

CMIS

Gmail

Web Services

IBM Secure Access Manager

QRadar risk & event detection

Page 16: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

16

3. Enable different classes of users, departments and geographies

A wide range

of use cases

BYOD/COPE/Shared

Kiosk mode

Public/Private apps

Persona policies

Data leak prevention

Blacklisting/whitelisting

URL filtering

File sync & share

Intranet access

Malware

Page 17: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

17

4. Secure work data and personal privacy with a native experience

Page 18: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

18

5. Automate your compliance rules and enforcement

Set granular security policies

Configure compliance rules engine

Automate near

real-time actions

Page 19: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

19

6. Support new OS and platform feature updates on release day

Page 20: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

20

7. Protect against advanced mobile security threats

Device risk data: • Malware found • Jailbreak or Root status • Suspicious system config

Install MaaS360 app with Trusteer, policies

& rules embedded

Policy & rules enforcement &

remediation

IBM MobileFirst Protect portal Trusteer Mobile Risk Engine

Over-the-air updates: • Malware definitions • Jailbreak & Root checks • Suspicious apps list

Page 21: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

21

8. Scales to meet the most demanding mobile environments

Executives

BYOD & Corporate

Want the latest devices & email

Sales

Multi-OS Security

Single department &

location enabled

Sales

Operations

Marketing

Apps & Content

Multiple departments & locations enabled

Sales

Finance/HR

Marketing

Engineering

Services

R&D

Business Transformation

Enterprise & global locations enabled

Operations

Page 22: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

22

Poll question

What solutions are you most interested in implementing for your organization’s mobile strategy? (check all that apply)

A. Mobile Device Management (MDM)

B. Mobile App Management (MAM)

C. Mobile Content Management (MCM) and Collaboration

D. Container solutions

E. Mobile Threat Management

Page 23: Top 8 Reasons to Switch from MDM to EMM

23 © 2015 IBM Corporation

Demo See MobileFirst Protect in Action

Page 24: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

24

Enable apps and content with trust on any device, anytime, anywhere

Delivering mobile security for the way people work

Page 25: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

25

The IBM mobile security framework

CA, Oracle, RSA

Configure devices & manage security policies

Automate enforcement

Mitigate risks of lost or compromised devices

Distribute & manage enterprise apps

Separate work & personal data

Protect apps & data from vulnerabilities

Enable work content availability & sharing

Create & edit content

Contain sensitive corporate information

Provide secure web & mobile access control

Deliver ease-of-use with SSO & unified identity

management

Extend Security Intelligence

Extend security information & event management (SIEM) to mobile environment

Incorporate log management, anomaly detection, configuration & vulnerability management

Manage Access and Fraud

Secure Content and Collaboration

Safeguard Applications and Data

Protect Devices

Page 26: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

26

Complete mobility management and security

Advanced Management Visibility & Control

Secure Productivity Suite Trusted Workplace

Secure Document Sharing Content Collaboration

Mobile Threat Management Malware Protection

Mobile Enterprise Gateway Enterprise Access

Page 27: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

27

Unleash end-user productivity

Secure PIM App Security & Management

File Sync, Edit & Share

Secure Browser

Trusted Workplace

Separates work & personal data with anytime access to corporate resources

Works across iOS, Android, & Windows Phone platforms with a native user experience

Supports Microsoft, Google, IBM & other collaboration tools, apps & containers

Page 28: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

28

Robust mobile security platform

Mobile Threat Management

Trusteer Risk & Event

Detection

QRadar

Unified Endpoint Management

BigFix Mobile Identity Access Control

ISAM

Integrated App Security

Worklight Integrated

Data Security

Guardium

o Automated Policy Compliance o Encryption & Data Protection o Authentication & Restrictions o Containerization & App VPN o Device Quarantine & Wipe

Page 29: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

29

Why IBM MobileFirst Protect?

Integrated solutions that connect

seamlessly to your existing and external

environments

Scalable data security with intelligence for the

volume, speed, and variability of mobile

Complete management of

devices, apps, content and users from a single platform

Page 30: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

30

Commitment to customer success

Mobile Security

A large U.S. children’s hospital protects

3,000+ mobile devices

ensuring HIPAA compliance; installed and integrated

with existing servers in just

90 minutes

MobileFirst Protect

Mobile Productivity

A leading gaming and entertainment company

reduces customer wait time by

80% with tablets using a single

managed app to speed the time to deliver food and drinks to customers

MobileFirst Protect

Page 31: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

31

Industry analyst opinions

“Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years

“Best-in-class cloud” among ranked EMM vendors

“Leader” in the 2014 Forrester Wave for Enterprise Mobile Management “Highest” in Current Offering

“Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report

“Highest Value Score” of the vendor group.

“Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment

Page 32: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

32

Get started now

Instant Access a free, fully functional trial for 30 days

Mobile Manage and secure your devices, apps and content

Easy Set up and configure your service in minutes

1 2 3

Page 33: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

33

Page 34: Top 8 Reasons to Switch from MDM to EMM

© 2015 IBM Corporation

IBM Security

34

www.ibm.com/security

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.


Recommended