SlideShare a Scribd company logo
Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2  ROI without Compromising Security, Management or Compliance
Introducing FaceTime Longest track record in the IM industry Founded in 1998; Privately funded 200 employees (90+ in R&D) Global Ops – California, India, Europe, Asia Leader in Security, Control and Compliance for Unified Communications #1 in market share five consecutive years 1000+ customers; 3M seats under management 9 of top10 US Banks Reserve Bank of New Zealand Strategic partnerships with IBM, Microsoft, and the Public IM network vendors including MSN, AOL, Yahoo, Google, Skype etc.
Some reasons for delayed decision / deployment Non–Compliance Exposure Corporate Acceptable Usage Policies, FSA, SOX, SEC 17a, NASD,  HIPAA, GLBA Liability, Freedom of Information Companies Act 2006, MiFID Increasingly Complex Worms/ viruses email  channels Ego-driven Network downtime SPAM Spyware/ botnets/rootkits Greynet channels Profit motivated Stealthy behavior SPIM Growth in IM/P2P threats Credit card #, NI#, Patient Health Info, Company Intellectual Property Information Leakage
So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries /  Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/  Archiving Auditing / Discovery Data Integrity Exporting Policies
Companies are Responding by Deploying Unified Communications Companies starting to roll out EIM Deployments increasingly include other UC modalities Security and compliance are key concerns …  Resulting in a Heterogeneous Environment
Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
Regulatory Compliance NASD, SEC, FERC regulations mandate archiving and review of all communications PCI, HIPAA regulations mandate tight control over confidential information eDiscovery  FRCP allows all ESI to be discoverable in federal courts Information Control Control information flows across myriad channels such as IM, P2P, Web 2.0 Enforce communication boundaries in contact centers, on trading desks, etc. Security Block malware and SpIM especially across multiple channels and federation boundaries  “ Must-Have” Requirements for Unified Communications
FaceTime Enabling businesses to leverage the benefits of  UC 2   by delivering  enterprise-grade solutions  that provide management, security and compliance across  the broadest set  of consumer and enterprise collaborative applications Content Control /Security Compliance & Discovery Management & Reporting Application Visibility / Control
FaceTime Product Portfolio
FaceTime Complements IBM Sametime Day Zero worm blocking & anti-spIM Data loss prevention Global, group and user-level controls IP-address  based controls Leverage existing AV infrastructure Real-time content filtering, scanning,  and blocking Multi-network support to help during transition to PIC and Sametime Standardization and enforcement of Sametime SECURITY
How does this help sell more licences for IBM Deployment is key! Some customers will not consider deployment without addressing security and / or compliance concerns. Other customers may pilot, but never fully deploy. If customers deploy even basic services, additional licences / functionality can be sold. FaceTime can support the IBM sale through: Supporting the business justification by demonstrating the scale of public real time applications already in use  (visibility) Standardisation on an enterprise platform and control of the public apps Address security, management, control, compliance and reporting concerns when considering Sametime. Allows consistency of policy across email and UC 2 Federation projects – alleviating security concerns when connecting to external partners and the public networks. FaceTime has a unique integration with the Sametime Gateway.
Don’t let any of the following stop / delay your deal Concerns Over management and control of public  / consumer IM applications On how to apply corporate policy for electronic communications to the Sametime environment. Over compliance  - archiving Sametime conversations for discovery, or exporting to a corporate archive platform Over how to secure an external federated connection using the Sametime Gateway. Over how to control users when utilising the different modalities in UC 2  (IM, file transfer, voice, video, web conferencing) Management  / User reporting of all activity across the Sametime environment. FaceTime solutions address all of these concerns If any of the above are delaying / stalling your deal, involve FaceTime.
Customer and Project examples Example Customers: HSBC (235k)-  global Sametime compliance and archiving  Swiss Re: (4k) - Sametime archiving to IBM archiving platform BNP Paribas UK (5k) – Sametime & PIM archiving to AXSOne archiving platform Societe Generale (18k) – Sametime & PIM management and archiving GlaxoSmithKline (60k) – Sametime & PIM security via Sametime Gateway Other Projects: Intesa San Paolo (10k-80k) – Sametime security, and compliance for internal deployment and external federation to customers. Sumitomo (2k) – Sametime security / compliance SITA (4k) – Sametime & PIM security for federated connections via ST Gateway Zurich Insurance – Security for Sametime federation to outsource providers.
How the FaceTime team can support you In the Sales Process Joint campaigns / events Joint presentations / sales visits Product Demonstrations / evaluations / technical reviews Documentation www.facetime.com/sametime Datasheets FaceTime IMAudtitor for Sametime and Sametime Gateway. FaceTime Unified Security Gateway Whitepapers Securing Unified Communications:  From Consumer-Based IM to Enterprise Collaboration and Beyond FaceTime solutions for IBM Lotus Sametime FaceTime Quick Reference card for IBM Lotus teams
FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
Questions?

More Related Content

PDF
Protecting Mobile
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PDF
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
PPTX
Smart Ims Presentation 01122009
PDF
Technology & Life Science Practice, FailSafe Overview
PDF
BYOD: UniBox
PPTX
Bordless Breaches and Migrating Malware
Protecting Mobile
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
3 Enablers of Successful Cyber Attacks and How to Thwart Them
We4IT lcty 2013 - captain mobility - mobile domino applications offline capab...
Smart Ims Presentation 01122009
Technology & Life Science Practice, FailSafe Overview
BYOD: UniBox
Bordless Breaches and Migrating Malware

What's hot (19)

PDF
Raz-Lee Security Corporate Profile
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Proactive Computer Support Company
PDF
F-Secure Corporation
PPT
FaceTime Web 2.0
PDF
Presentation cloud security the grand challenge
PPTX
Emerging trends in it
DOCX
PDF
Byod+ +bring+your+own+device
 
PDF
PPS
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
PDF
Evolving with Corporate IM Compliance Regulations
PPTX
MobileIron Presentation
PDF
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
PPTX
Steering microservices with istio
PDF
Solution Guide Secure Access Architecture
PPT
Wifi Security for SOHOs: Cyberoam UTM CR15wi
PPT
ACC 626 Slidecast
PPT
Palo Alto Networks Soc Ent Okt2009
Raz-Lee Security Corporate Profile
The Secure Path to Value in the Cloud by Denny Heaberlin
Proactive Computer Support Company
F-Secure Corporation
FaceTime Web 2.0
Presentation cloud security the grand challenge
Emerging trends in it
Byod+ +bring+your+own+device
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Evolving with Corporate IM Compliance Regulations
MobileIron Presentation
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
Steering microservices with istio
Solution Guide Secure Access Architecture
Wifi Security for SOHOs: Cyberoam UTM CR15wi
ACC 626 Slidecast
Palo Alto Networks Soc Ent Okt2009
Ad

Viewers also liked (20)

PPT
FSS Canada Launch Presentation
PDF
Workshop socialnetworking hra
PDF
PPT
Opening Microtravel
PPTX
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
PPTX
Appearances do matter leadership in a crisis
PPT
BioWikis BSB10
PDF
Install Lotus Connections on Blackberry
PPT
PDF
Lotus Mashups step by step installation guide
PDF
Chuong 6 nhung nen tang cua tang truong
PPT
Luxury Real Estate Stats 4 26
PDF
Chuong 1 tu bat on vi mo den con duong tai co cau
PPT
Cicada Consulting
PDF
Chuong 7 doi moi tu duy va cai cach the che
ODP
Wikipedia and the Global Brain
PDF
Developing your social media strategy
PPT
IBM SaaS eMeeting To Questionnaire
PDF
Breaking thinking.vietnam.dtnbs
PPT
Presentation1
FSS Canada Launch Presentation
Workshop socialnetworking hra
Opening Microtravel
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
Appearances do matter leadership in a crisis
BioWikis BSB10
Install Lotus Connections on Blackberry
Lotus Mashups step by step installation guide
Chuong 6 nhung nen tang cua tang truong
Luxury Real Estate Stats 4 26
Chuong 1 tu bat on vi mo den con duong tai co cau
Cicada Consulting
Chuong 7 doi moi tu duy va cai cach the che
Wikipedia and the Global Brain
Developing your social media strategy
IBM SaaS eMeeting To Questionnaire
Breaking thinking.vietnam.dtnbs
Presentation1
Ad

Similar to IBM Sametime and Facetime (20)

PDF
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
PDF
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
PPT
Palo alto networks next generation firewalls
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
PPT
Presentacion Palo Alto Networks
PDF
Top Security Trends In A Hosted Contact Centre Solution
PPT
dataProtection_p3.ppt
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PPT
Insight into IT Strategic Challenges
PPTX
Good for Enterprise by GMS Mobility
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
SecurePass at OpenBrighton
PPT
Emea Corporate Presentation 0709 Lin
PDF
What’s the State of Your Endpoint Security?
PPTX
Mobile Voice Recording (MVR)
PPT
Enterprise Mobility - An Introduction
PPTX
David valovcin big data - big risk
PDF
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
PDF
Developing cross platform solutions
PDF
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Palo alto networks next generation firewalls
Partner Zymbian & Fortinet webinar on Web2.0 security
Presentacion Palo Alto Networks
Top Security Trends In A Hosted Contact Centre Solution
dataProtection_p3.ppt
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Insight into IT Strategic Challenges
Good for Enterprise by GMS Mobility
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
SecurePass at OpenBrighton
Emea Corporate Presentation 0709 Lin
What’s the State of Your Endpoint Security?
Mobile Voice Recording (MVR)
Enterprise Mobility - An Introduction
David valovcin big data - big risk
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Developing cross platform solutions
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...

More from Chris Sparshott (20)

PDF
IBM and Apache Spark
DOC
2016 IBM choice award winners
DOC
2016 IBM Beacon award winners
PPT
How to create an event video
PPT
IBM Acquisitions
PDF
Maximo licensing information and usage restrictions 11 March 2015
PPTX
SPSS Modeler 16 What's New!?
PPTX
IBM MQ v8 enhancements
PPT
WebSphere application server 8.5.5 - quick overview
PPTX
Urban code - DevOps - cost reduction
PPTX
Bluemix, PaaS by IBM - Screenshot demo
PPTX
Cloud Computing IaaS
PDF
Cloud computing From Iaas to PaaS to SaaS
PDF
IBM Software Support and Subscription
PDF
Apple iPhone and iPad at IBM
PPT
SUN Solaris Zones WebSphere Portal licensing
PPT
Domino must gather information
PPT
The business value of notes 8.5.1
PPT
IBM SaaS Change Profile Picture
PPT
IBM SaaS Complete A Questionnaire
IBM and Apache Spark
2016 IBM choice award winners
2016 IBM Beacon award winners
How to create an event video
IBM Acquisitions
Maximo licensing information and usage restrictions 11 March 2015
SPSS Modeler 16 What's New!?
IBM MQ v8 enhancements
WebSphere application server 8.5.5 - quick overview
Urban code - DevOps - cost reduction
Bluemix, PaaS by IBM - Screenshot demo
Cloud Computing IaaS
Cloud computing From Iaas to PaaS to SaaS
IBM Software Support and Subscription
Apple iPhone and iPad at IBM
SUN Solaris Zones WebSphere Portal licensing
Domino must gather information
The business value of notes 8.5.1
IBM SaaS Change Profile Picture
IBM SaaS Complete A Questionnaire

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hybrid model detection and classification of lung cancer
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
cloud_computing_Infrastucture_as_cloud_p
Hybrid model detection and classification of lung cancer
TLE Review Electricity (Electricity).pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A novel scalable deep ensemble learning framework for big data classification...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
SOPHOS-XG Firewall Administrator PPT.pptx
Mushroom cultivation and it's methods.pdf
A Presentation on Touch Screen Technology
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf

IBM Sametime and Facetime

  • 1. Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2 ROI without Compromising Security, Management or Compliance
  • 2. Introducing FaceTime Longest track record in the IM industry Founded in 1998; Privately funded 200 employees (90+ in R&D) Global Ops – California, India, Europe, Asia Leader in Security, Control and Compliance for Unified Communications #1 in market share five consecutive years 1000+ customers; 3M seats under management 9 of top10 US Banks Reserve Bank of New Zealand Strategic partnerships with IBM, Microsoft, and the Public IM network vendors including MSN, AOL, Yahoo, Google, Skype etc.
  • 3. Some reasons for delayed decision / deployment Non–Compliance Exposure Corporate Acceptable Usage Policies, FSA, SOX, SEC 17a, NASD, HIPAA, GLBA Liability, Freedom of Information Companies Act 2006, MiFID Increasingly Complex Worms/ viruses email channels Ego-driven Network downtime SPAM Spyware/ botnets/rootkits Greynet channels Profit motivated Stealthy behavior SPIM Growth in IM/P2P threats Credit card #, NI#, Patient Health Info, Company Intellectual Property Information Leakage
  • 4. So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 5. Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/ Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 6. Companies are Responding by Deploying Unified Communications Companies starting to roll out EIM Deployments increasingly include other UC modalities Security and compliance are key concerns … Resulting in a Heterogeneous Environment
  • 7. Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
  • 8. FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
  • 9. Regulatory Compliance NASD, SEC, FERC regulations mandate archiving and review of all communications PCI, HIPAA regulations mandate tight control over confidential information eDiscovery FRCP allows all ESI to be discoverable in federal courts Information Control Control information flows across myriad channels such as IM, P2P, Web 2.0 Enforce communication boundaries in contact centers, on trading desks, etc. Security Block malware and SpIM especially across multiple channels and federation boundaries “ Must-Have” Requirements for Unified Communications
  • 10. FaceTime Enabling businesses to leverage the benefits of UC 2 by delivering enterprise-grade solutions that provide management, security and compliance across the broadest set of consumer and enterprise collaborative applications Content Control /Security Compliance & Discovery Management & Reporting Application Visibility / Control
  • 12. FaceTime Complements IBM Sametime Day Zero worm blocking & anti-spIM Data loss prevention Global, group and user-level controls IP-address based controls Leverage existing AV infrastructure Real-time content filtering, scanning, and blocking Multi-network support to help during transition to PIC and Sametime Standardization and enforcement of Sametime SECURITY
  • 13. How does this help sell more licences for IBM Deployment is key! Some customers will not consider deployment without addressing security and / or compliance concerns. Other customers may pilot, but never fully deploy. If customers deploy even basic services, additional licences / functionality can be sold. FaceTime can support the IBM sale through: Supporting the business justification by demonstrating the scale of public real time applications already in use (visibility) Standardisation on an enterprise platform and control of the public apps Address security, management, control, compliance and reporting concerns when considering Sametime. Allows consistency of policy across email and UC 2 Federation projects – alleviating security concerns when connecting to external partners and the public networks. FaceTime has a unique integration with the Sametime Gateway.
  • 14. Don’t let any of the following stop / delay your deal Concerns Over management and control of public / consumer IM applications On how to apply corporate policy for electronic communications to the Sametime environment. Over compliance - archiving Sametime conversations for discovery, or exporting to a corporate archive platform Over how to secure an external federated connection using the Sametime Gateway. Over how to control users when utilising the different modalities in UC 2 (IM, file transfer, voice, video, web conferencing) Management / User reporting of all activity across the Sametime environment. FaceTime solutions address all of these concerns If any of the above are delaying / stalling your deal, involve FaceTime.
  • 15. Customer and Project examples Example Customers: HSBC (235k)- global Sametime compliance and archiving Swiss Re: (4k) - Sametime archiving to IBM archiving platform BNP Paribas UK (5k) – Sametime & PIM archiving to AXSOne archiving platform Societe Generale (18k) – Sametime & PIM management and archiving GlaxoSmithKline (60k) – Sametime & PIM security via Sametime Gateway Other Projects: Intesa San Paolo (10k-80k) – Sametime security, and compliance for internal deployment and external federation to customers. Sumitomo (2k) – Sametime security / compliance SITA (4k) – Sametime & PIM security for federated connections via ST Gateway Zurich Insurance – Security for Sametime federation to outsource providers.
  • 16. How the FaceTime team can support you In the Sales Process Joint campaigns / events Joint presentations / sales visits Product Demonstrations / evaluations / technical reviews Documentation www.facetime.com/sametime Datasheets FaceTime IMAudtitor for Sametime and Sametime Gateway. FaceTime Unified Security Gateway Whitepapers Securing Unified Communications: From Consumer-Based IM to Enterprise Collaboration and Beyond FaceTime solutions for IBM Lotus Sametime FaceTime Quick Reference card for IBM Lotus teams
  • 17. FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare

Editor's Notes

  • #2: 09/08/09
  • #3: Headquartered in Foster City, CA Founded 1998; 1st IM partnership w/AOL -1999 500+ corporate customers; over 2M seats 8 of top 10 US Banks, 4 of top 5 Canadian Banks, 70% of largest Financial Services 154 employees: N. America, India, EMEA, APAC Privately funded: $30M total since 2001 24 month relationship with XBlock Systems, then acquired them in May 2005 Financials Privately held; industry analysts estimate $8m+ FaceTime provides security and compliance for Greynets – IM, P2P, adware/spyware 650 customers; over 2M seats under management 8 of top 10 YS Banks; 70% of largest Financial Services Horizontal: GE, Apple, Motorola, Medtronic, NCR, DISA FaceTime enables safe use and control of “Greynets” Security: Block worms, protect intellectual property, stop SpIM, scan for malware Compliance: Logging, auditing, archiving messages Management: Applying powerful and granular policies FaceTime has the strongest market position Largest deployed base of seats Largest employee base (150 employees w/ >90 in R&D) Largest security research team (FaceTime Security Labs)
  • #12: BEST PRACTICES DEPLOYMENT 1: Deploy FTEE to ensure compliance and security Guarantee compliance with TrueCompliance TM Stop worms and viruses and block SPIM Stop rogue IM & P2P and block circumvention at the perimeter 2: Monitor and analyze usage patterns Who is using what networks? What features are being used? File transfer, VoIP, app sharing, etc. How much and what P2P usage is going on? 3: Formulate usage policies By user, network and capabilities 4: Implement and enforce policies IMA for logging and audit workflow RTG to control non-compliant use
  • #14: 09/08/09
  • #15: 09/08/09
  • #16: 09/08/09
  • #17: 09/08/09
  • #19: 09/08/09