28
© 2015 IBM Corporation Elevate MaaS360 MDM to Secure Productivity A contained & productive work place for users on-the-go Matt Shaver | Jimmy Tsang IBM Security August 20, 2015 IBM MobileFirst Protect

Elevate MaaS360 MDM to Secure Productivity

Embed Size (px)

Citation preview

Page 1: Elevate MaaS360 MDM to Secure Productivity

© 2015 IBM Corporation

Elevate MaaS360 MDM to Secure Productivity A contained & productive work place for users on-the-go

Matt Shaver | Jimmy Tsang IBM Security August 20, 2015

IBM MobileFirst Protect

Page 2: Elevate MaaS360 MDM to Secure Productivity

2 © 2015 IBM Corporation

Housekeeping items

Duration – 60 minutes Submit your questions to all

panelists in the Q&A box located in the bottom right corner of your screen

Recording and slides will be emailed to you tomorrow

Page 3: Elevate MaaS360 MDM to Secure Productivity

3 © 2015 IBM Corporation

Introductions

Jimmy Tsang Dir of Product Marketing

IBM

Matt Shaver Customer Engineer

IBM

Page 4: Elevate MaaS360 MDM to Secure Productivity

4 © 2015 IBM Corporation

Challenges with enterprise mobility

IBM MobileFirst Protect Productivity Suite

IBM MobileFirst Protect Gateway Suite

Demo

Q&A

Agenda

Page 5: Elevate MaaS360 MDM to Secure Productivity

5 © 2015 IBM Corporation

Which email system do you currently support? (a) Exchange

(b) Lotus Traveler / SmartCloud

(c) Office 365

(d) Google Apps for Work / Gmail

(e) Other

Poll question

Page 6: Elevate MaaS360 MDM to Secure Productivity

6 © 2015 IBM Corporation

Mobile changes the way

people work

Mobile provides a better

experience

Mobile creates risk of company data

Mobile is strategic for business

Page 7: Elevate MaaS360 MDM to Secure Productivity

7 © 2015 IBM Corporation

Mobile is complex and challenging to manage

Mobile mixes personal

and work

Mobile lives outside

your perimeter

Mobile is fast-paced and

multi-platform

Page 8: Elevate MaaS360 MDM to Secure Productivity

8 © 2015 IBM Corporation

What IT and security pros are saying

“How do I ensure all devices accessing our network are secured and encrypted?”

“How do I enable my workforce with the right apps and user experience at the right time?”

Maximize Productivity Amplify Protection

“How do I manage the rapid deployment of devices in a cost-effective way, esp. with BYOD?”

“How do I tie in to all my existing systems? I need to protect my investment!”

“How do I ensure authorized access to customer data and protect against threats?”

“How do I show that we are compliant with our policies and industry regulations?”

AND

CIO CISO

Page 9: Elevate MaaS360 MDM to Secure Productivity

9 © 2015 IBM Corporation

Complete mobility management and security

Advanced Management Visibility & Control

Secure Document Sharing Content Collaboration

Mobile Threat Management Malware Protection

Mobile Enterprise Gateway Enterprise Access

Secure Productivity Suite Trusted Workplace

Page 10: Elevate MaaS360 MDM to Secure Productivity

10 © 2015 IBM Corporation

Unleash end-user productivity

Secure PIM App Security & Management

File Sync, Edit & Share

Secure Browser

Trusted Workplace

Separates work & personal data with anytime access to corporate resources

Works across iOS, Android & Windows Phone platforms with a native user experience

Supports Microsoft, Google, IBM & other collaboration tools, apps & containers

Page 11: Elevate MaaS360 MDM to Secure Productivity

11 © 2015 IBM Corporation

IBM MobileFirst Protect Secure Mail

Contains emails & attachments to prevent data leakage

FIPS 140-2 compliant, AES-256 bit encryption for data at rest

Enforce authentication, cut & paste restrictions & view-only mode

Restrict forwarding, moving & screen captures

Conduct on-line & off-line compliance checks prior accessing email

An intuitive personal information management (PIM) app with email, calendar & contacts for iOS, Android & Windows Phone

Page 12: Elevate MaaS360 MDM to Secure Productivity

12 © 2015 IBM Corporation

IBM MobileFirst Protect Browser

Allow access to corporate intranet sites & network without VPN (e.g. JIRA)

Define URL filters & security policies based on categories

Block known malicious websites Enforce whitelist exceptions Restrict cookies, downloads, copy/paste

& print features to prevent data leaks Disable native & 3rd party web browsers

A feature-rich web browser for secure access to intranet sites & compliance of content policies for iOS, Android & Windows Phone

Page 13: Elevate MaaS360 MDM to Secure Productivity

13 © 2015 IBM Corporation

IBM MobileFirst Protect Application Security

Enable user authentication Stop access from compromised

devices Restrict cut/copy/paste Enforce file protection Limit data backup to iTunes Alert administrators of violations Take automated actions IBM MobileFirst Protect Market for

best-in-class apps from developers leveraging SDK

A mobile application container with full operational & security management to protect against data leaks for iOS & Android

Simple App Wrapper when deploying enterprise apps with MAM

or Robust Software Development Kit

(SDK) to integrate right in app code

Page 14: Elevate MaaS360 MDM to Secure Productivity

14 © 2015 IBM Corporation

MaaS360 Market

Best-in-Class Enterprise Apps leveraging the SDK powered by MaaS360 Application Security http://www.maas360.com/partner-program/maas360-market/

Page 15: Elevate MaaS360 MDM to Secure Productivity

15 © 2015 IBM Corporation

Secure Productivity Suite Trusted Workplace

Complete mobility management and security

Advanced Management Visibility & Control

Secure Document Sharing Content Collaboration

Mobile Threat Management Malware Protection

Mobile Enterprise Gateway Enterprise Access

Page 16: Elevate MaaS360 MDM to Secure Productivity

16 © 2015 IBM Corporation

IBM MobileFirst Protect Gateway for Browser

Browse right from the IBM MobileFirst Protect Browser No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls No changes to your network or firewall security settings

Simple & secure access to enterprise intranet sites & legacy web apps on a mobile device

Enterprise Web Servers

Enterprise Apps

Intranet

Gateway

Page 17: Elevate MaaS360 MDM to Secure Productivity

17 © 2015 IBM Corporation

IBM MobileFirst Protect Gateway for Apps

Secure per app VPN tunnel to internal data resources to enhance enterprise apps on a mobile device

Files

Content

Data

Gateway

Enable & distribute private apps with enterprise data, secured using IBM MobileFirst Protect Applications & IBM MobileFirst Protect Application Security

No need for user to initiate a device-level VPN connection No changes to your network or firewall security settings

Page 18: Elevate MaaS360 MDM to Secure Productivity

18 © 2015 IBM Corporation

IBM MobileFirst Protect Gateway for Documents

Access document files & folders using IBM MobileFirst Protect Content Create, edit, save & share documents securely No need for user to initiate a device-level VPN connection Protect data with robust security policies & DLP controls

Seamless & secure access to internal SharePoint sites, Windows File Shares & other enterprise file stores on a mobile device

IBM Connections

CMIS

Internal SharePoint

Windows File Shares

Gateway

Page 19: Elevate MaaS360 MDM to Secure Productivity

19 © 2015 IBM Corporation

Key benefits

Mobilize corporate information including emails, content and intranet

Securely support both BYOD and corporate devices – separate work from personal

Reduce the risk of sensitive data leakage of corporate information

Take automated actions to enforce compliance with security policies

Page 20: Elevate MaaS360 MDM to Secure Productivity

20 © 2015 IBM Corporation

How do you currently provide access to your intranet sites on mobile devices?

(a) By having users initiate a device VPN session every time

(b) By using the MaaS360 gateway with the MaaS360 Secure Browser

(c) By using a third-party gateway with a browser

(d) We don’t currently provide access

Poll question

Page 21: Elevate MaaS360 MDM to Secure Productivity

© 2015 IBM Corporation

Demo of the Secure Productivity Suite

Page 22: Elevate MaaS360 MDM to Secure Productivity

22 © 2015 IBM Corporation

Enable apps and content with trust on any device, anytime, anywhere

Delivering mobile security for the way people work

Page 23: Elevate MaaS360 MDM to Secure Productivity

23 © 2015 IBM Corporation

Seamless enterprise integration

Advanced Management Visibility & Control

Secure Productivity Suite Trusted Workplace

Secure Document Sharing Content Collaboration

Mobile Threat Management Malware Protection

Mobile Enterprise Gateway Enterprise Access

BYOD Corporate

Shared

Mail systems Directories Certificates File shares

Exchange

Lotus Traveler

Gmail

Office 365

Intranet

Web Apps

Page 24: Elevate MaaS360 MDM to Secure Productivity

24 © 2015 IBM Corporation

Just reach out to your Account

Executive and we can turn it on

for you in the same day

Easy to enable the Secure Productivity Suite

Page 25: Elevate MaaS360 MDM to Secure Productivity

25 © 2015 IBM Corporation

Would you like to be contacted about having the Secure Productivity Suite and/or Mobile Enterprise Gateway enabled in your environment? (a) Yes

(b) No

Poll question

Page 26: Elevate MaaS360 MDM to Secure Productivity

26 © 2015 IBM Corporation

Page 27: Elevate MaaS360 MDM to Secure Productivity

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU www.ibm.com/security

Page 28: Elevate MaaS360 MDM to Secure Productivity

© 2015 IBM Corporation

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.

Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml

Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.

Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Legal notices and disclaimers