SlideShare a Scribd company logo
© 2015 IBM Corporation
Mobility Training Series
Mobility 101: Provision
Lindsey Elgie, IBM
Kayla Heineman, IBM
IBM Security
2© 2015 IBM Corporationwww.agilly.net
The IBM mobile security framework
CA, Oracle, RSA
Configure devices &
manage security policies
Automate enforcement
Mitigate risks of lost or
compromised devices
Distribute & manage
enterprise apps
Separate work &
personal data
Protect apps & data
from vulnerabilities
Enable work content
availability & sharing
Create & edit content
Contain sensitive
corporate information
Provide secure web &
mobile access control
Deliver ease-of-use with
SSO & unified identity
management
Extend Security Intelligence
Extend security information & event management (SIEM) to mobile environment
Incorporate log management, anomaly detection, configuration & vulnerability management
Manage Access
and Fraud
Secure Content
and Collaboration
Safeguard
Applications and Data
Protect
Devices
3© 2015 IBM Corporationwww.agilly.net
Complete mobility management and security
Advanced Management
Visibility & Control
Secure Productivity Suite
Trusted Workplace
Secure Document Sharing
Content Collaboration
Mobile Threat Management
Malware Protection
Mobile Enterprise Gateway
Enterprise Access
© 2015 IBM Corporation
Demo
See MobileFirst Protect in Action
5© 2015 IBM Corporationwww.agilly.net
Get started now
Instant
Access a free,
fully functional
trial for 30 days
Mobile
Manage and secure
your devices, apps
and content
Easy
Set up and
configure your
service in minutes
1
2 3
Click here
http://trymaas360.agilly.net
And enjoy your 30 days free trial
6© 2015 IBM Corporationwww.agilly.net
Une division de
www.agilly.net
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security

More Related Content

PPTX
Mobility 301 : Protect
PPTX
Mobility 201 : Productivity
PDF
IBM Cloud Security Enforcer
PDF
MaaS360 - Mobile Expense Management
PPTX
IBM Security intelligence v1 - ahmed el nahas
PPTX
IBM MaaS360 with Watson
PDF
Laptop management
PDF
An Integrated, Intelligent Approach to Security
Mobility 301 : Protect
Mobility 201 : Productivity
IBM Cloud Security Enforcer
MaaS360 - Mobile Expense Management
IBM Security intelligence v1 - ahmed el nahas
IBM MaaS360 with Watson
Laptop management
An Integrated, Intelligent Approach to Security

What's hot (20)

PDF
IBM Security 2017 Lunch and Learn Series
PDF
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
PDF
Are Cloud Apps the Invisible Man?
PDF
Mobility Training Series : Mobility 301 protect
PDF
Web App Sec Tisc
PPT
7 critical steps to protect your data
PDF
Productivity Suite
PPTX
Enterprise Mobility Management
PPTX
Enabling Users to Save Work Files to their Phones
PPTX
Structure of iso 27001
PPTX
Enterprise Mobility Suite- Azure RMS
PPTX
Follow the Money, Follow the Crime
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PDF
Mobile Threat Management
PDF
IBM MaaS360 with watson
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PPT
Isms awareness training
PDF
CYBERSECURITY.pdf
PDF
Microsoft Intune - Global Azure Bootcamp 2018
PDF
Fixico presentation
IBM Security 2017 Lunch and Learn Series
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Are Cloud Apps the Invisible Man?
Mobility Training Series : Mobility 301 protect
Web App Sec Tisc
7 critical steps to protect your data
Productivity Suite
Enterprise Mobility Management
Enabling Users to Save Work Files to their Phones
Structure of iso 27001
Enterprise Mobility Suite- Azure RMS
Follow the Money, Follow the Crime
ISO 27001 - information security user awareness training presentation -part 2
Mobile Threat Management
IBM MaaS360 with watson
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Isms awareness training
CYBERSECURITY.pdf
Microsoft Intune - Global Azure Bootcamp 2018
Fixico presentation
Ad

Viewers also liked (12)

PDF
Future Assist EBook Insurance
DOCX
PDF
Advanced Mobile Content Collaboration with BOX.NET
PDF
Fintech: A Job, Career or your Vision?
PPT
The Bluemix Quadruple Threat
PPTX
The Case for WordPress for Toastmasters
PPTX
Time expresions na2 unit 2 b
PDF
Floor Certificate
PDF
"EUBrasilCloudFORUM Coordinated Support Action Project"
ODP
Oral practice tips & examples
PPT
Structuralism, Post-structuralism, and Structuration
PPT
Post colonialism
Future Assist EBook Insurance
Advanced Mobile Content Collaboration with BOX.NET
Fintech: A Job, Career or your Vision?
The Bluemix Quadruple Threat
The Case for WordPress for Toastmasters
Time expresions na2 unit 2 b
Floor Certificate
"EUBrasilCloudFORUM Coordinated Support Action Project"
Oral practice tips & examples
Structuralism, Post-structuralism, and Structuration
Post colonialism
Ad

Similar to Mobility 101 : Provision (20)

PDF
Améliorer la productivité des employés et se protéger contre les menaces ...
PDF
Simple and secure mobile cloud access
PPTX
Are We There Yet? The Path Towards Securing the Mobile Enterprise
PDF
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
PPTX
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
PPTX
Security in the Cognitive Era: Why it matters more than ever
PDF
8 Principales Raisons de Passer du MDM à l'EMM
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
Kista watson summit final public version
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PDF
Android for Work Sécurité Mobile avancée dans la poche
PDF
IBM - IAM Security and Trends
PDF
2015 Mobile Security Trends: Are You Ready?
PDF
IBM Security SaaS IaaS and PaaS
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
PPTX
Security Principles for CEOs
PPTX
Fernando Imperiale - Una aguja en el pajar
PPTX
Fernando Imperiale - Una aguja en el pajar
Améliorer la productivité des employés et se protéger contre les menaces ...
Simple and secure mobile cloud access
Are We There Yet? The Path Towards Securing the Mobile Enterprise
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
Security in the Cognitive Era: Why it matters more than ever
8 Principales Raisons de Passer du MDM à l'EMM
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Kista watson summit final public version
Orchestrate Your Security Defenses; Protect Against Insider Threats
Android for Work Sécurité Mobile avancée dans la poche
IBM - IAM Security and Trends
2015 Mobile Security Trends: Are You Ready?
IBM Security SaaS IaaS and PaaS
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
Security Principles for CEOs
Fernando Imperiale - Una aguja en el pajar
Fernando Imperiale - Una aguja en el pajar

More from AGILLY (20)

PDF
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
PDF
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
PDF
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
PDF
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
PPTX
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
PDF
5 façons de transformer la connectivité cloud
PDF
Agilly vulnérabilité log4j-sucuri
PDF
Ds sandblast-mobile fr
PDF
Sandblast agent-solution-brief fr
PPTX
Sand Blast Agent Anti Ransomware Presentation
PDF
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
PDF
12 Prédictions Majeures sur la Cyber Sécurité en 2017
PPTX
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
PDF
Bluemix Plateforme d'Innovation Numérique
PDF
Malware on Smartphones and Tablets - The Inconvenient Truth
PPTX
Bluemix Overview
PPTX
Windows 10 A Guide to Secure Mobility in the Enterprise
PDF
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
PPTX
IBM Verse & Connections Cloud : Travailler autrement
PDF
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
5 façons de transformer la connectivité cloud
Agilly vulnérabilité log4j-sucuri
Ds sandblast-mobile fr
Sandblast agent-solution-brief fr
Sand Blast Agent Anti Ransomware Presentation
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
12 Prédictions Majeures sur la Cyber Sécurité en 2017
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Bluemix Plateforme d'Innovation Numérique
Malware on Smartphones and Tablets - The Inconvenient Truth
Bluemix Overview
Windows 10 A Guide to Secure Mobility in the Enterprise
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
IBM Verse & Connections Cloud : Travailler autrement
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
AI in Product Development-omnex systems
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Nekopoi APK 2025 free lastest update
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Transform Your Business with a Software ERP System
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Digital Strategies for Manufacturing Companies
2025 Textile ERP Trends: SAP, Odoo & Oracle
Online Work Permit System for Fast Permit Processing
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
AI in Product Development-omnex systems
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Nekopoi APK 2025 free lastest update
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Wondershare Filmora 15 Crack With Activation Key [2025
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
ManageIQ - Sprint 268 Review - Slide Deck
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Odoo POS Development Services by CandidRoot Solutions
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Transform Your Business with a Software ERP System
Odoo Companies in India – Driving Business Transformation.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Which alternative to Crystal Reports is best for small or large businesses.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)

Mobility 101 : Provision

  • 1. © 2015 IBM Corporation Mobility Training Series Mobility 101: Provision Lindsey Elgie, IBM Kayla Heineman, IBM IBM Security
  • 2. 2© 2015 IBM Corporationwww.agilly.net The IBM mobile security framework CA, Oracle, RSA Configure devices & manage security policies Automate enforcement Mitigate risks of lost or compromised devices Distribute & manage enterprise apps Separate work & personal data Protect apps & data from vulnerabilities Enable work content availability & sharing Create & edit content Contain sensitive corporate information Provide secure web & mobile access control Deliver ease-of-use with SSO & unified identity management Extend Security Intelligence Extend security information & event management (SIEM) to mobile environment Incorporate log management, anomaly detection, configuration & vulnerability management Manage Access and Fraud Secure Content and Collaboration Safeguard Applications and Data Protect Devices
  • 3. 3© 2015 IBM Corporationwww.agilly.net Complete mobility management and security Advanced Management Visibility & Control Secure Productivity Suite Trusted Workplace Secure Document Sharing Content Collaboration Mobile Threat Management Malware Protection Mobile Enterprise Gateway Enterprise Access
  • 4. © 2015 IBM Corporation Demo See MobileFirst Protect in Action
  • 5. 5© 2015 IBM Corporationwww.agilly.net Get started now Instant Access a free, fully functional trial for 30 days Mobile Manage and secure your devices, apps and content Easy Set up and configure your service in minutes 1 2 3 Click here http://trymaas360.agilly.net And enjoy your 30 days free trial
  • 6. 6© 2015 IBM Corporationwww.agilly.net Une division de www.agilly.net
  • 7. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security