© 2015 IBM Corporation
A New Era of Security
for a New Era of Computing
November 19, 2015
IBM Security
2© 2015 IBM Corporation
Expand the value of security solutions through integration
Continuous actionable intelligence
Consulting
Services
IBM X-Force Research
Managed
Services
Trusteer Apex
Endpoint
zSecure
BigFix
Advanced
Fraud
Trusteer
Pinpoint
Trusteer
Rapport
Data
Key Lifecycle Manager
Guardium Suite
Mobile
MobileFirst Protect
(MaaS360)
MobileFirst Platform
(Worklight)
Network
Network
Protection XGS
SiteProtector
Applications
AppScan
Identity
and Access
Privileged Identity Manager
Access Manager
Identity Manager
QRadar SIEM
QRadar Log Manager
QRadar Vulnerability
Manager
QRadar
Incident
Forensics
QRadar
Risk
Manager
Ecosystem Partners
Trusteer
Mobile
Security
Intelligence
3© 2015 IBM Corporation
IBM Security latest analyst report rankings
Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23
Domain Market Segment / Report
Gartner
Magic Quadrant (MQ)
Market Share (MS)
Forrester
Wave
IDC
Market Share (MS)
MarketScape (MSc)
Security Intelligence Security Information and Event Management (SIEM) Leader
2015 MQ / 2015 MS
Leader
2015 MS
Fraud Protection Web Fraud Detection (Trusteer) Leader
2013 MQ
Identity and
Access Management
Federated Identity Management and Single Sign-On
Leader
2013 MSc
Identity and Access Governance Leader
2015 MQ / 2015 MS
Strong Contender
2013
Identity and Access Management as a Service (IDaaS) Visionary
2015 MQ
Web Access Management (WAM) Leader
‘13 MarketScope, ‘15 MS
Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan
Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole
Data Security
Database Auditing and Real-Time Protection Leader
2011
Data Masking Leader
2014 MQ
Application Security Application Security Testing (dynamic and static) Leader
2014 MQ / 2015 MS
Leader
2014
Leader
2013 MS
Network, Endpoint
and Mobile Security
Network Intrusion Prevention Systems (NIPS) Challenger
2014 MQ
Endpoint: Client Management Tools Leader
2015 MQ
Endpoint Protection Platforms (EPP) Visionary
2014 MQ
Strong Performer
2013
Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader
2015 MQ
Leader
2014
Leader
2014 MS
Consulting and
Managed Services
Managed Security Services (MSS) Leader
2014 MQ (NA, WW)
Leader
2014 (NA)
Leader
2014 MS
Information Security Consulting Services Leader
2013
Public Cloud Service Providers’ Security (IBM Bluemix)
Strong Contender
2014
4© 2015 IBM Corporation
monitored countries (MSS)
service delivery experts
devices under contract
+
endpoints protected
+
events managed per day
+
IBM Security by the Numbers
+
+
IBM Security has global reach
© 2015 IBM Corporation
IBM MobileFirst Protect (MaaS360)
Total Enterprise Mobility:
“BYOD, Managing and Securing Mobile Devices”
6© 2015 IBM Corporation
Image credit: Reuters via Business Insider
2005
7© 2015 IBM Corporation
Image credit: Reuters via Business Insider
2014
8© 2015 IBM Corporation
Mobile
changes the way
people work
Mobile
provides a better
experience
Mobile
creates risk of
company data
Mobile is strategic for business
9© 2015 IBM Corporation
Mobile is complex and challenging to manage
Mobile
mixes personal
and work
Mobile
lives outside
your perimeter
Mobile
is fast-paced and
multi-platform
10© 2015 IBM Corporation
What IT and security pros are saying
“How do I ensure all devices
accessing our network are
secured and encrypted?”
“How do I enable my workforce
with the right apps and user
experience at the right time?”
Maximize Productivity Amplify Protection
“How do I manage the rapid
deployment of devices in a cost-
effectiveway?”
“How do I tie in to all my existing
systems? I need to protect my
investment!”
“How do I ensure authorized
access to customer data and
protect against threats?”
“How do I show that we are
compliant with our policies and
industry regulations?”
AND
CIO CISO
11© 2015 IBM Corporation
Threats from Malware and Mobile Devices
12© 2015 IBM Corporation
Rich in Features: One Platform, One Vendor for All Mobile
Needs
IBM MobileFirst Protect (MaaS360) Standard Offerings:
– Advance Mobile Management (AMM): Core Mobile
Management
• Mobile Device Management
• Mobile Application Management
• Expense Management
– Secure Productivity Suite (SPS):Secure Mobile Containers
• Secure Email Management
• Secure Web Management
• Secure App Management
– Secure Document Sharing (SDS): Secure Content
Collaboration
• Secure Document Viewer
• Secure Document Edit
• Secure Document Sync
– Mobile Enterprise Gateway (MEG): Seamless Enterprise
Access
• Enterprise Gateway for Secure Browser
• Enterprise Gateway for Docs
• Enterprise Gateway for Apps
– Mobile Malware Protect
• Threat Management
13© 2015 IBM Corporation
Mobile Device Management
• Manage smartphones, tablets & laptops featuring iOS, Android,
Windows Phone, BlackBerry, Windows PC & OS X
• Gain complete visibility of devices, security & network
• Enforce compliance with real-time & automated actions
Mobile Expense Management
• Monitor mobile data usage with real-time alerts
• Set policies to restrict or limit data & voice roaming
• Review integrated reporting and analytics
Mobile Application Management
• Deploy custom enterprise app catalogs
• Blacklist, whitelist & require apps
• Administer app volume purchase programs
MaaS360 Advanced Mobile Management
14© 2015 IBM Corporation
 Secure Mail
 Application Security
 Secure Browser
 Secure Document Sharing
WorkPlace Container for Mobile Collaboration
Dual Persona to Separate Work and Personal
15© 2015 IBM Corporation
Secure Browser
• Enable secure access to intranet sites & web apps w/o VPN
• Define URL filters based on categories & whitelisted sites
• Restrict cookies, downloads, copy/paste & print features
MaaS360 Secure Productivity Suite
Secure Mail
• Contain email text & attachments to prevent data leakage
• Enforce authentication, copy/paste & forwarding restrictions
• FIPS 140-2 compliant, AES-256 bit encryption for data at rest
Application Security
• Contain enterprise apps with a simple app wrapper or SDK
• Enforce authentication & copy/paste restrictions
• Prevent access from compromised devices
16© 2015 IBM Corporation
Secure Editor
• Create, edit & save content in a secure, encrypted container
• Collaborate on Word, Excel, PowerPoint & text files
• Change fonts & insert images, tables, shapes, links & more
MaaS360 Secure Document Sharing
Mobile Content Management
• Contain documents & files to prevent data leakage
• Enforce authentication, copy/paste & view-only restrictions
• Access MaaS360 distributed content & repositories such as
SharePoint, Box & Google Drive
Secure Document Sync
• Synchronize user content across managed devices
• Restrict copy/paste & opening in unmanaged apps
• Store content securely, both in the cloud & on devices
17© 2015 IBM Corporation
Mobile Enterprise Gateway for Docs
• Enhance MaaS360 Mobile Content Management with secure
access to internal files, e.g. SharePoint & Windows File Share
• Retrieve enterprise documents without a device VPN session
Mobile Enterprise Gateway for Browser
• Enable MaaS360 Secure Browser to access enterprise intranet
sites, web apps & network resources
• Access seamlessly & securely without needing a VPN session
on mobile device
Mobile Enterprise Gateway for Apps
• Add in-app VPN to MaaS360 Application Security to integrate
behind-the-firewall data in enterprise apps
• Incorporate enterprise data without a device VPN session
MaaS360 Mobile Enterprise Gateway
18© 2015 IBM Corporation
Integrated Threat Management powered by industry leading Trusteer technology
MaaS360 combines the mobile risk assessment capabilities of
Trusteer with the real-time control of MaaS360-based EMM in a
fully integrated solution
 Mobile malware detection detects known malicious files based on their MD5s
 Rogue app detection identifies potentially malicious apps based on permission analysis
 Cloud-based threat intelligence to augment device context analysis with information such as last known location
MaaS360 Threat Management
19© 2015 IBM Corporation
MaaS360 Dashboard & Reporting
20© 2015 IBM Corporation
MaaS360
Personal Work Mail Content
MaaS360
File Sharing
MaaS360
Editor Intranet
MaaS360 Powers User Productivity
21© 2015 IBM Corporation
Mobilize Apps & Content
on Corporate Networks
Integrate with Existing
Enterprise Systems
File Systems
Web
Services
Lotus Traveler
Certificates
Office 365
Exchange
ActiveSync
Active
Directory/LDAP
Network/Intranet
Box
Google Drive
SharePoint
Cloud
Extender™
Mobile Enterprise
Gateway™
IBM
Connections
CMIS
Web Services
APIs
Integrate with External Systems
Dashboard
Portal
Admin View
Seamless Enterprise Integration
22© 2015 IBM Corporation
True SaaS Multi-tenancy
Lightening fast deployment
Zero added infrastructure
Zero maintenance
All inclusive pricing
Unlimited scalability
Pay as you go
Effortlessly keep up with the
pace of change in mobility
×Difficult and lengthy deployment
×Heavy infrastructure
×Constant maintenance and upgrades
Traditional Appliance Based
Advantages of a Cloud Based EMM Model
23© 2015 IBM Corporation
IBM enabled MaaS360 for internal
use 5 days after acquisition close
Users migrated
in one month
Users registered
within 24 hours
Users registered
in 15 days
Devices enrolled
per minute*
*at high point
Help Desk calls –
less than ½ of 1%
IBM Deploys MaaS360
24© 2015 IBM Corporation
Strong adoption in the enterprise
Manufacturing Consumer OthersPublicHealthcare Financial
25© 2015 IBM Corporation
Industry analyst opinions
“Leader” in the Magic Quadrant
Enterprise Mobility Management Suites for 4 years
“Best-in-class cloud” among ranked EMM vendors
“Leader” in the 2014 Forrester Wave for
Enterprise Mobile Management
“Highest” in Current Offering
“Champion” in the 2015 Enterprise Mobility
Management Vendor Landscape Report
“Highest Value Score” of the vendor group.
“Leader” Worldwide Enterprise Mobility Management
Software 2014 Vendor Assessment
26© 2015 IBM Corporation
26
Email with one-time passcode + custom URL + QR codeSMS text message and/or
Simple Enrollment
27© 2015 IBM Corporation
Get Started Now
maas360.com
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices,
emails, apps and
docs
Easy
Set up and
configure your
service in minutes
1 2 3
© 2015 IBM Corporation
Managed Service Providers Mobile Device
Security Offering
Powered by IBM MObileFirst Protect (MaaS360)
29© 2015 IBM Corporation
Market Opportunity - Worldwide EMM Market Size Forecasts
30© 2015 IBM Corporation
Why buying Mobile Device Security from MSP is better than
DIY for business customers
31© 2015 IBM Corporation
IBM MobileFirst Protect Partnership with other
Telecommunications providers
 Sell-through
– O2, Verizon Wireless
 Sell-with
– Verizon Wireless
 Managed Service
– Cisco, Daisy, Olive
 Bundled
– Cisco, Forescout
32© 2015 IBM Corporation
– Model: Sell-through partnership, Co-branded
– GTM: Self-Service & Managed Service, Sales
Overlay, Add-on Services
– Support: O2 does 1st and 2nd level
– Deployment: MobileFirst Protect Public Cloud
– Model: Sell-with / Sell-through partnership with
Verizon
– GTM: Enable Sales Teams/Resellers, Leads
Pass-through, Billing integration
– Deployment: MobileFirst Protect Public Cloud
– Support: MobileFirst Protect
IBM MobileFirst Protect Successful Partnership
33© 2015 IBM Corporation
Fully Brandable and Localizable
 Branding
– Self-service partner branding of portal
• Logo, Product name, Favicon, Copyright, URLs, Email Sender,
Contact and support information
– Trial registration page
• Logo, lead notification recipient
– End user apps
• Custom development may be required
 Localization
– MaaS360 Portal and Apps
• English, German, Spanish, French, Italian, , Portuguese, Dutch,
Russian, Japanese, Korean, Chinese (Simplified and Traditional)
33
34© 2015 IBM Corporation
MaaS360 Public
Platform
• Hosted at maas360.com
• Multi-tenant / Shared
• Multi-tiered / Brandable
• Zero infrastructure
• Hosted at SoftLayer
• Single-tenant / Private
• Multi-tiered / Brandable
• Zero infrastructure
• Hosting and setup fees
required
• 3 reference architectures
• < 100,000 devices
• 100K – 250K
• 250K – 1M
• Hosted at Partner
• Single-tenant / Private
• Multi-tiered / Brandable
• Infrastructure required
• Setup fees required
• 3 reference architectures
• < 100,000 devices
• 100K – 250K
• 250K – 1M
MaaS360 Hosted
Platform
MaaS360 On-Prem
Platform
IBM MobileFirst Protect (MaaS360) Deployment Models
35© 2015 IBM Corporation
Learn more about IBM Security
V2015-05-15
133 countries where IBM delivers
managed security services
24 industry analyst reports rank
IBM Security as a LEADER
TOP 3 enterprise security software
vendor in total revenue
12K clients protected including…
22 of the top 29 banks in Japan,
North America, and Europe
Visit our website
IBM Security Website
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security

More Related Content

PPTX
IBM Mobile First Client Presentation
PDF
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
PPTX
Ibm mobile first briefing
PDF
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
PDF
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
PDF
Enterprise mobility services
PDF
IBM MobileFirst and Case Studies_Frank Müller_IBM Symposium 2013
PPTX
Overview of Enterprise Mobility
IBM Mobile First Client Presentation
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
Ibm mobile first briefing
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Enterprise mobility services
IBM MobileFirst and Case Studies_Frank Müller_IBM Symposium 2013
Overview of Enterprise Mobility

What's hot (19)

PPTX
5 Steps for Enterprise Mobility
ODP
Enterprise Mobility Solutions & Services
PPT
Enterprise Mobility - An Introduction
PDF
Mobile World Congress 2013 IBM-ATT Session
PDF
IBM Mobile Overview for Ecosystem Partners
PDF
IBM Mobile First
PDF
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
PPTX
Enterprise mobility management
PDF
Put your business in motion with IBM MobileFirst
PDF
EMM and MBaaS: How IT Can Enable Secure App Development
PDF
Top 8 Enterprise Mobility Trends 2015
 
PPT
Enterprise Mobility Strategy
PDF
03 put your business in motion become a mobile enterprise icty
PDF
Ibm mobilefirst overview presentation
PDF
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
PPT
IBM Partner Jam - 10th April 2013
PPT
An Overview on IBM MobileFirst Platform v7
PDF
Mobility and the Real-Time Enterprise
PPT
Key Architectural Aspects of a Enterprise Mobility Solution
5 Steps for Enterprise Mobility
Enterprise Mobility Solutions & Services
Enterprise Mobility - An Introduction
Mobile World Congress 2013 IBM-ATT Session
IBM Mobile Overview for Ecosystem Partners
IBM Mobile First
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Enterprise mobility management
Put your business in motion with IBM MobileFirst
EMM and MBaaS: How IT Can Enable Secure App Development
Top 8 Enterprise Mobility Trends 2015
 
Enterprise Mobility Strategy
03 put your business in motion become a mobile enterprise icty
Ibm mobilefirst overview presentation
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Partner Jam - 10th April 2013
An Overview on IBM MobileFirst Platform v7
Mobility and the Real-Time Enterprise
Key Architectural Aspects of a Enterprise Mobility Solution
Ad

Viewers also liked (8)

DOC
Taronja alba aumatell casas cs
PPTX
From Managing Devices to Apps to Data
PPTX
CA Management Cloud - Enterprise Mobility
PDF
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
PPTX
Executive Overview of Service Management in the Mobile Era
PPTX
Mobile Data Management, The Next Frontier of Enterprise Mobility
PDF
WSO2 Enterprise Mobility Manager - Product Overview
PPTX
A strategic view of mobile device management
Taronja alba aumatell casas cs
From Managing Devices to Apps to Data
CA Management Cloud - Enterprise Mobility
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Executive Overview of Service Management in the Mobile Era
Mobile Data Management, The Next Frontier of Enterprise Mobility
WSO2 Enterprise Mobility Manager - Product Overview
A strategic view of mobile device management
Ad

Similar to Ibm mobile first protect (maas360) (20)

PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
PDF
IBM Maas360 with Watson
PDF
IBM MaaS360 with watson
PDF
MaaS 360
PDF
Are Cloud Apps the Invisible Man?
PDF
IBM Cloud Security Enforcer
PDF
Ibm fiberlink analyst presentation nov 13 final
PPT
MDM is not Enough - Parmelee
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PPT
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
PPTX
MaaS360 with Watson
PDF
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
PDF
Microsoft Enterprise Mobility Suite Presented by Atidan
PDF
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
PPTX
IBM Security Portfolio - 2015
PPTX
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
PDF
8 Principales Raisons de Passer du MDM à l'EMM
PDF
Presentation cloud security the grand challenge
PDF
Becoming an interconnected enterprise
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
IBM Maas360 with Watson
IBM MaaS360 with watson
MaaS 360
Are Cloud Apps the Invisible Man?
IBM Cloud Security Enforcer
Ibm fiberlink analyst presentation nov 13 final
MDM is not Enough - Parmelee
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
MaaS360 with Watson
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Microsoft Enterprise Mobility Suite Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
IBM Security Portfolio - 2015
#bluemixdrone is at Southbank for the IBM Service Advisory Exchange
8 Principales Raisons de Passer du MDM à l'EMM
Presentation cloud security the grand challenge
Becoming an interconnected enterprise

More from gule mariam (6)

PDF
Bluemix introduction
PDF
[Whitepaper] an overview of ibm mobile first platform
PDF
Ibm ecm brief overview 2015
PDF
Internet of things
PDF
Social collaboration at work
PDF
Tallent management ibm smarter workforce
Bluemix introduction
[Whitepaper] an overview of ibm mobile first platform
Ibm ecm brief overview 2015
Internet of things
Social collaboration at work
Tallent management ibm smarter workforce

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
STKI Israel Market Study 2025 version august
PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
Modernising the Digital Integration Hub
CloudStack 4.21: First Look Webinar slides
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
O2C Customer Invoices to Receipt V15A.pptx
Architecture types and enterprise applications.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
STKI Israel Market Study 2025 version august
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
A contest of sentiment analysis: k-nearest neighbor versus neural network
NewMind AI Weekly Chronicles – August ’25 Week III
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A review of recent deep learning applications in wood surface defect identifi...
observCloud-Native Containerability and monitoring.pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Zenith AI: Advanced Artificial Intelligence

Ibm mobile first protect (maas360)

  • 1. © 2015 IBM Corporation A New Era of Security for a New Era of Computing November 19, 2015 IBM Security
  • 2. 2© 2015 IBM Corporation Expand the value of security solutions through integration Continuous actionable intelligence Consulting Services IBM X-Force Research Managed Services Trusteer Apex Endpoint zSecure BigFix Advanced Fraud Trusteer Pinpoint Trusteer Rapport Data Key Lifecycle Manager Guardium Suite Mobile MobileFirst Protect (MaaS360) MobileFirst Platform (Worklight) Network Network Protection XGS SiteProtector Applications AppScan Identity and Access Privileged Identity Manager Access Manager Identity Manager QRadar SIEM QRadar Log Manager QRadar Vulnerability Manager QRadar Incident Forensics QRadar Risk Manager Ecosystem Partners Trusteer Mobile Security Intelligence
  • 3. 3© 2015 IBM Corporation IBM Security latest analyst report rankings Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23 Domain Market Segment / Report Gartner Magic Quadrant (MQ) Market Share (MS) Forrester Wave IDC Market Share (MS) MarketScape (MSc) Security Intelligence Security Information and Event Management (SIEM) Leader 2015 MQ / 2015 MS Leader 2015 MS Fraud Protection Web Fraud Detection (Trusteer) Leader 2013 MQ Identity and Access Management Federated Identity Management and Single Sign-On Leader 2013 MSc Identity and Access Governance Leader 2015 MQ / 2015 MS Strong Contender 2013 Identity and Access Management as a Service (IDaaS) Visionary 2015 MQ Web Access Management (WAM) Leader ‘13 MarketScope, ‘15 MS Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole Data Security Database Auditing and Real-Time Protection Leader 2011 Data Masking Leader 2014 MQ Application Security Application Security Testing (dynamic and static) Leader 2014 MQ / 2015 MS Leader 2014 Leader 2013 MS Network, Endpoint and Mobile Security Network Intrusion Prevention Systems (NIPS) Challenger 2014 MQ Endpoint: Client Management Tools Leader 2015 MQ Endpoint Protection Platforms (EPP) Visionary 2014 MQ Strong Performer 2013 Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader 2015 MQ Leader 2014 Leader 2014 MS Consulting and Managed Services Managed Security Services (MSS) Leader 2014 MQ (NA, WW) Leader 2014 (NA) Leader 2014 MS Information Security Consulting Services Leader 2013 Public Cloud Service Providers’ Security (IBM Bluemix) Strong Contender 2014
  • 4. 4© 2015 IBM Corporation monitored countries (MSS) service delivery experts devices under contract + endpoints protected + events managed per day + IBM Security by the Numbers + + IBM Security has global reach
  • 5. © 2015 IBM Corporation IBM MobileFirst Protect (MaaS360) Total Enterprise Mobility: “BYOD, Managing and Securing Mobile Devices”
  • 6. 6© 2015 IBM Corporation Image credit: Reuters via Business Insider 2005
  • 7. 7© 2015 IBM Corporation Image credit: Reuters via Business Insider 2014
  • 8. 8© 2015 IBM Corporation Mobile changes the way people work Mobile provides a better experience Mobile creates risk of company data Mobile is strategic for business
  • 9. 9© 2015 IBM Corporation Mobile is complex and challenging to manage Mobile mixes personal and work Mobile lives outside your perimeter Mobile is fast-paced and multi-platform
  • 10. 10© 2015 IBM Corporation What IT and security pros are saying “How do I ensure all devices accessing our network are secured and encrypted?” “How do I enable my workforce with the right apps and user experience at the right time?” Maximize Productivity Amplify Protection “How do I manage the rapid deployment of devices in a cost- effectiveway?” “How do I tie in to all my existing systems? I need to protect my investment!” “How do I ensure authorized access to customer data and protect against threats?” “How do I show that we are compliant with our policies and industry regulations?” AND CIO CISO
  • 11. 11© 2015 IBM Corporation Threats from Malware and Mobile Devices
  • 12. 12© 2015 IBM Corporation Rich in Features: One Platform, One Vendor for All Mobile Needs IBM MobileFirst Protect (MaaS360) Standard Offerings: – Advance Mobile Management (AMM): Core Mobile Management • Mobile Device Management • Mobile Application Management • Expense Management – Secure Productivity Suite (SPS):Secure Mobile Containers • Secure Email Management • Secure Web Management • Secure App Management – Secure Document Sharing (SDS): Secure Content Collaboration • Secure Document Viewer • Secure Document Edit • Secure Document Sync – Mobile Enterprise Gateway (MEG): Seamless Enterprise Access • Enterprise Gateway for Secure Browser • Enterprise Gateway for Docs • Enterprise Gateway for Apps – Mobile Malware Protect • Threat Management
  • 13. 13© 2015 IBM Corporation Mobile Device Management • Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC & OS X • Gain complete visibility of devices, security & network • Enforce compliance with real-time & automated actions Mobile Expense Management • Monitor mobile data usage with real-time alerts • Set policies to restrict or limit data & voice roaming • Review integrated reporting and analytics Mobile Application Management • Deploy custom enterprise app catalogs • Blacklist, whitelist & require apps • Administer app volume purchase programs MaaS360 Advanced Mobile Management
  • 14. 14© 2015 IBM Corporation  Secure Mail  Application Security  Secure Browser  Secure Document Sharing WorkPlace Container for Mobile Collaboration Dual Persona to Separate Work and Personal
  • 15. 15© 2015 IBM Corporation Secure Browser • Enable secure access to intranet sites & web apps w/o VPN • Define URL filters based on categories & whitelisted sites • Restrict cookies, downloads, copy/paste & print features MaaS360 Secure Productivity Suite Secure Mail • Contain email text & attachments to prevent data leakage • Enforce authentication, copy/paste & forwarding restrictions • FIPS 140-2 compliant, AES-256 bit encryption for data at rest Application Security • Contain enterprise apps with a simple app wrapper or SDK • Enforce authentication & copy/paste restrictions • Prevent access from compromised devices
  • 16. 16© 2015 IBM Corporation Secure Editor • Create, edit & save content in a secure, encrypted container • Collaborate on Word, Excel, PowerPoint & text files • Change fonts & insert images, tables, shapes, links & more MaaS360 Secure Document Sharing Mobile Content Management • Contain documents & files to prevent data leakage • Enforce authentication, copy/paste & view-only restrictions • Access MaaS360 distributed content & repositories such as SharePoint, Box & Google Drive Secure Document Sync • Synchronize user content across managed devices • Restrict copy/paste & opening in unmanaged apps • Store content securely, both in the cloud & on devices
  • 17. 17© 2015 IBM Corporation Mobile Enterprise Gateway for Docs • Enhance MaaS360 Mobile Content Management with secure access to internal files, e.g. SharePoint & Windows File Share • Retrieve enterprise documents without a device VPN session Mobile Enterprise Gateway for Browser • Enable MaaS360 Secure Browser to access enterprise intranet sites, web apps & network resources • Access seamlessly & securely without needing a VPN session on mobile device Mobile Enterprise Gateway for Apps • Add in-app VPN to MaaS360 Application Security to integrate behind-the-firewall data in enterprise apps • Incorporate enterprise data without a device VPN session MaaS360 Mobile Enterprise Gateway
  • 18. 18© 2015 IBM Corporation Integrated Threat Management powered by industry leading Trusteer technology MaaS360 combines the mobile risk assessment capabilities of Trusteer with the real-time control of MaaS360-based EMM in a fully integrated solution  Mobile malware detection detects known malicious files based on their MD5s  Rogue app detection identifies potentially malicious apps based on permission analysis  Cloud-based threat intelligence to augment device context analysis with information such as last known location MaaS360 Threat Management
  • 19. 19© 2015 IBM Corporation MaaS360 Dashboard & Reporting
  • 20. 20© 2015 IBM Corporation MaaS360 Personal Work Mail Content MaaS360 File Sharing MaaS360 Editor Intranet MaaS360 Powers User Productivity
  • 21. 21© 2015 IBM Corporation Mobilize Apps & Content on Corporate Networks Integrate with Existing Enterprise Systems File Systems Web Services Lotus Traveler Certificates Office 365 Exchange ActiveSync Active Directory/LDAP Network/Intranet Box Google Drive SharePoint Cloud Extender™ Mobile Enterprise Gateway™ IBM Connections CMIS Web Services APIs Integrate with External Systems Dashboard Portal Admin View Seamless Enterprise Integration
  • 22. 22© 2015 IBM Corporation True SaaS Multi-tenancy Lightening fast deployment Zero added infrastructure Zero maintenance All inclusive pricing Unlimited scalability Pay as you go Effortlessly keep up with the pace of change in mobility ×Difficult and lengthy deployment ×Heavy infrastructure ×Constant maintenance and upgrades Traditional Appliance Based Advantages of a Cloud Based EMM Model
  • 23. 23© 2015 IBM Corporation IBM enabled MaaS360 for internal use 5 days after acquisition close Users migrated in one month Users registered within 24 hours Users registered in 15 days Devices enrolled per minute* *at high point Help Desk calls – less than ½ of 1% IBM Deploys MaaS360
  • 24. 24© 2015 IBM Corporation Strong adoption in the enterprise Manufacturing Consumer OthersPublicHealthcare Financial
  • 25. 25© 2015 IBM Corporation Industry analyst opinions “Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years “Best-in-class cloud” among ranked EMM vendors “Leader” in the 2014 Forrester Wave for Enterprise Mobile Management “Highest” in Current Offering “Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report “Highest Value Score” of the vendor group. “Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
  • 26. 26© 2015 IBM Corporation 26 Email with one-time passcode + custom URL + QR codeSMS text message and/or Simple Enrollment
  • 27. 27© 2015 IBM Corporation Get Started Now maas360.com Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, emails, apps and docs Easy Set up and configure your service in minutes 1 2 3
  • 28. © 2015 IBM Corporation Managed Service Providers Mobile Device Security Offering Powered by IBM MObileFirst Protect (MaaS360)
  • 29. 29© 2015 IBM Corporation Market Opportunity - Worldwide EMM Market Size Forecasts
  • 30. 30© 2015 IBM Corporation Why buying Mobile Device Security from MSP is better than DIY for business customers
  • 31. 31© 2015 IBM Corporation IBM MobileFirst Protect Partnership with other Telecommunications providers  Sell-through – O2, Verizon Wireless  Sell-with – Verizon Wireless  Managed Service – Cisco, Daisy, Olive  Bundled – Cisco, Forescout
  • 32. 32© 2015 IBM Corporation – Model: Sell-through partnership, Co-branded – GTM: Self-Service & Managed Service, Sales Overlay, Add-on Services – Support: O2 does 1st and 2nd level – Deployment: MobileFirst Protect Public Cloud – Model: Sell-with / Sell-through partnership with Verizon – GTM: Enable Sales Teams/Resellers, Leads Pass-through, Billing integration – Deployment: MobileFirst Protect Public Cloud – Support: MobileFirst Protect IBM MobileFirst Protect Successful Partnership
  • 33. 33© 2015 IBM Corporation Fully Brandable and Localizable  Branding – Self-service partner branding of portal • Logo, Product name, Favicon, Copyright, URLs, Email Sender, Contact and support information – Trial registration page • Logo, lead notification recipient – End user apps • Custom development may be required  Localization – MaaS360 Portal and Apps • English, German, Spanish, French, Italian, , Portuguese, Dutch, Russian, Japanese, Korean, Chinese (Simplified and Traditional) 33
  • 34. 34© 2015 IBM Corporation MaaS360 Public Platform • Hosted at maas360.com • Multi-tenant / Shared • Multi-tiered / Brandable • Zero infrastructure • Hosted at SoftLayer • Single-tenant / Private • Multi-tiered / Brandable • Zero infrastructure • Hosting and setup fees required • 3 reference architectures • < 100,000 devices • 100K – 250K • 250K – 1M • Hosted at Partner • Single-tenant / Private • Multi-tiered / Brandable • Infrastructure required • Setup fees required • 3 reference architectures • < 100,000 devices • 100K – 250K • 250K – 1M MaaS360 Hosted Platform MaaS360 On-Prem Platform IBM MobileFirst Protect (MaaS360) Deployment Models
  • 35. 35© 2015 IBM Corporation Learn more about IBM Security V2015-05-15 133 countries where IBM delivers managed security services 24 industry analyst reports rank IBM Security as a LEADER TOP 3 enterprise security software vendor in total revenue 12K clients protected including… 22 of the top 29 banks in Japan, North America, and Europe Visit our website IBM Security Website Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 36. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security