ibm mobile first protect (maas360)

36
© 2015 IBM Corporation A New Era of Security for a New Era of Computing November 19, 2015 IBM Security

Upload: gule-mariam

Post on 13-Apr-2017

822 views

Category:

Technology


2 download

TRANSCRIPT

© 2015 IBM Corporation

A New Era of Securityfor a New Era of ComputingNovember 19, 2015

IBM Security

2© 2015 IBM Corporation

Expand the value of security solutions through integrationContinuous actionable intelligence

ConsultingServices

IBM X-Force Research

Managed Services

Trusteer Apex

Endpoint

zSecure

BigFix

AdvancedFraud

Trusteer Pinpoint

Trusteer Rapport

Data

Key Lifecycle Manager

Guardium Suite

Mobile

MobileFirst Protect(MaaS360)

MobileFirst Platform(Worklight)

Network

Network Protection XGS

SiteProtector

ApplicationsAppScan

Identityand Access

Privileged Identity Manager

Access Manager

Identity Manager

QRadar SIEM

QRadar Log ManagerQRadar Vulnerability Manager

QRadarIncident ForensicsQRadar RiskManager

Ecosystem Partners

Trusteer Mobile

Security Intelligence

3© 2015 IBM Corporation

IBM Security latest analyst report rankings

Note: Rankings compiled as of July, 2015 No ranking available V2015-07-23

Domain Market Segment / ReportGartner

Magic Quadrant (MQ)Market Share (MS)

Forrester Wave

IDCMarket Share (MS) MarketScape (MSc)

Security Intelligence Security Information and Event Management (SIEM) Leader2015 MQ / 2015 MS

Leader2015 MS

Fraud Protection Web Fraud Detection (Trusteer) Leader2013 MQ

Identity and Access Management

Federated Identity Management and Single Sign-On

Leader2013 MSc

Identity and Access Governance Leader2015 MQ / 2015 MS

Strong Contender2013

Identity and Access Management as a Service (IDaaS) Visionary2015 MQ

Web Access Management (WAM) Leader‘13 MarketScope, ‘15 MS

Mobile Access Management Leader, 2014 Customer Value, Frost & Sullivan

Identity Provisioning Management Leader, 2014 Leadership Compass, KuppingerCole

Data SecurityDatabase Auditing and Real-Time Protection Leader

2011

Data Masking Leader2014 MQ

Application Security Application Security Testing (dynamic and static) Leader2014 MQ / 2015 MS

Leader2014

Leader2013 MS

Network, Endpoint and Mobile Security

Network Intrusion Prevention Systems (NIPS) Challenger2014 MQ

Endpoint: Client Management Tools Leader2015 MQ

Endpoint Protection Platforms (EPP) Visionary2014 MQ

Strong Performer2013

Enterprise Mobility Management: MobileFirst Protect (MaaS360) Leader2015 MQ

Leader2014

Leader2014 MS

Consulting and Managed Services

Managed Security Services (MSS) Leader2014 MQ (NA, WW)

Leader2014 (NA)

Leader2014 MS

Information Security Consulting Services Leader2013

Public Cloud Service Providers’ Security (IBM Bluemix) Strong Contender2014

4© 2015 IBM Corporation

monitored countries (MSS)

service delivery experts

devices under contract+

endpoints protected+

events managed per day+

IBM Security by the Numbers

+

+

IBM Security has global reach

© 2015 IBM Corporation

IBM MobileFirst Protect (MaaS360)Total Enterprise Mobility:“BYOD, Managing and Securing Mobile Devices”

6© 2015 IBM Corporation

Image credit: Reuters via Business Insider

2005

7© 2015 IBM Corporation

Image credit: Reuters via Business Insider

2014

8© 2015 IBM Corporation

Mobilechanges the way

people work

Mobileprovides a better

experience

Mobile creates risk of company data

Mobile is strategic for business

9© 2015 IBM Corporation

Mobile is complex and challenging to manage

Mobilemixes personal

and work

Mobilelives outside

your perimeter

Mobileis fast-paced and

multi-platform

10© 2015 IBM Corporation

What IT and security pros are saying

“How do I ensure all devices accessing our network are secured and encrypted?”

“How do I enable my workforce with the right apps and user experience at the right time?”

Maximize Productivity Amplify Protection

“How do I manage the rapid deployment of devices in a cost-effective way?”

“How do I tie in to all my existing systems? I need to protect my investment!”

“How do I ensure authorized access to customer data and protect against threats?”

“How do I show that we are compliant with our policies and industry regulations?”

AND

CIO CISO

11© 2015 IBM Corporation

Threats from Malware and Mobile Devices

12© 2015 IBM Corporation

Rich in Features: One Platform, One Vendor for All Mobile Needs

IBM MobileFirst Protect (MaaS360) Standard Offerings:– Advance Mobile Management (AMM): Core Mobile

Management• Mobile Device Management• Mobile Application Management• Expense Management

– Secure Productivity Suite (SPS):Secure Mobile Containers• Secure Email Management• Secure Web Management• Secure App Management

– Secure Document Sharing (SDS): Secure Content Collaboration• Secure Document Viewer• Secure Document Edit• Secure Document Sync

– Mobile Enterprise Gateway (MEG): Seamless Enterprise Access• Enterprise Gateway for Secure Browser• Enterprise Gateway for Docs• Enterprise Gateway for Apps

– Mobile Malware Protect• Threat Management

13© 2015 IBM Corporation

Mobile Device Management• Manage smartphones, tablets & laptops featuring iOS, Android,

Windows Phone, BlackBerry, Windows PC & OS X• Gain complete visibility of devices, security & network• Enforce compliance with real-time & automated actions

Mobile Expense Management• Monitor mobile data usage with real-time alerts• Set policies to restrict or limit data & voice roaming• Review integrated reporting and analytics

Mobile Application Management• Deploy custom enterprise app catalogs• Blacklist, whitelist & require apps• Administer app volume purchase programs

MaaS360 Advanced Mobile Management

14© 2015 IBM Corporation

Secure Mail

Application Security

Secure Browser

Secure Document Sharing

WorkPlace Container for Mobile Collaboration

Dual Persona to Separate Work and Personal

15© 2015 IBM Corporation

Secure Browser• Enable secure access to intranet sites & web apps w/o VPN• Define URL filters based on categories & whitelisted sites• Restrict cookies, downloads, copy/paste & print features

MaaS360 Secure Productivity Suite

Secure Mail• Contain email text & attachments to prevent data leakage• Enforce authentication, copy/paste & forwarding restrictions• FIPS 140-2 compliant, AES-256 bit encryption for data at rest

Application Security• Contain enterprise apps with a simple app wrapper or SDK• Enforce authentication & copy/paste restrictions• Prevent access from compromised devices

16© 2015 IBM Corporation

Secure Editor• Create, edit & save content in a secure, encrypted container• Collaborate on Word, Excel, PowerPoint & text files• Change fonts & insert images, tables, shapes, links & more

MaaS360 Secure Document Sharing

Mobile Content Management• Contain documents & files to prevent data leakage• Enforce authentication, copy/paste & view-only restrictions• Access MaaS360 distributed content & repositories such as

SharePoint, Box & Google Drive

Secure Document Sync• Synchronize user content across managed devices• Restrict copy/paste & opening in unmanaged apps• Store content securely, both in the cloud & on devices

17© 2015 IBM Corporation

Mobile Enterprise Gateway for Docs• Enhance MaaS360 Mobile Content Management with secure

access to internal files, e.g. SharePoint & Windows File Share• Retrieve enterprise documents without a device VPN session

Mobile Enterprise Gateway for Browser• Enable MaaS360 Secure Browser to access enterprise intranet

sites, web apps & network resources• Access seamlessly & securely without needing a VPN session

on mobile device

Mobile Enterprise Gateway for Apps• Add in-app VPN to MaaS360 Application Security to integrate

behind-the-firewall data in enterprise apps• Incorporate enterprise data without a device VPN session

MaaS360 Mobile Enterprise Gateway

18© 2015 IBM Corporation

Integrated Threat Management powered by industry leading Trusteer technology

MaaS360 combines the mobile risk assessment capabilities of Trusteer with the real-time control of MaaS360-based EMM in a fully integrated solution

Mobile malware detection detects known malicious files based on their MD5s

Rogue app detection identifies potentially malicious apps based on permission analysis Cloud-based threat intelligence to augment device context analysis with information such as last known location

MaaS360 Threat Management

19© 2015 IBM Corporation

MaaS360 Dashboard & Reporting

20© 2015 IBM Corporation

MaaS360

Personal Work Mail Content

MaaS360

File Sharing

MaaS360

Editor Intranet

MaaS360 Powers User Productivity

21© 2015 IBM Corporation

Mobilize Apps & Contenton Corporate Networks

Integrate with Existing Enterprise Systems

File Systems

Web Services

Lotus Traveler

Certificates

Office 365

Exchange ActiveSync

Active Directory/LDAP

Network/Intranet

Box

Google Drive

SharePoint

Cloud Extender™

Mobile EnterpriseGateway™

IBM Connections

CMIS

Web Services APIs

Integrate with External Systems

DashboardPortalAdmin View

Seamless Enterprise Integration

22© 2015 IBM Corporation

True SaaS Multi-tenancyLightening fast deploymentZero added infrastructureZero maintenanceAll inclusive pricingUnlimited scalabilityPay as you go

Effortlessly keep up with the pace of change in mobility

×Difficult and lengthy deployment×Heavy infrastructure×Constant maintenance and upgrades

Traditional Appliance Based

Advantages of a Cloud Based EMM Model

23© 2015 IBM Corporation

IBM enabled MaaS360 for internal use 5 days after acquisition close Users migrated

in one month

Users registered within 24 hours

Users registered in 15 days

Devices enrolled per minute*

*at high point

Help Desk calls –less than ½ of 1%

IBM Deploys MaaS360

24© 2015 IBM Corporation

Strong adoption in the enterprise

Manufacturing Consumer OthersPublicHealthcare Financial

25© 2015 IBM Corporation

Industry analyst opinions

“Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years

“Best-in-class cloud” among ranked EMM vendors

“Leader” in the 2014 Forrester Wave for Enterprise Mobile Management“Highest” in Current Offering

“Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report

“Highest Value Score” of the vendor group.

“Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment

26© 2015 IBM Corporation

26

Email with one-time passcode + custom URL + QR codeSMS text message and/or

Simple Enrollment

27© 2015 IBM Corporation

Get Started Now

maas360.com

InstantAccess a free, fully functional trial for 30 days

MobileManage and secure your devices, emails, apps and docs

EasySet up and configure your service in minutes

1 2 3

© 2015 IBM Corporation

Managed Service Providers Mobile Device Security OfferingPowered by IBM MObileFirst Protect (MaaS360)

29© 2015 IBM Corporation

Market Opportunity - Worldwide EMM Market Size Forecasts

30© 2015 IBM Corporation

Why buying Mobile Device Security from MSP is better than DIY for business customers

31© 2015 IBM Corporation

IBM MobileFirst Protect Partnership with other Telecommunications providers

Sell-through– O2, Verizon Wireless

Sell-with– Verizon Wireless

Managed Service– Cisco, Daisy, Olive

Bundled– Cisco, Forescout

32© 2015 IBM Corporation

– Model: Sell-through partnership, Co-branded– GTM: Self-Service & Managed Service, Sales

Overlay, Add-on Services– Support: O2 does 1st and 2nd level– Deployment: MobileFirst Protect Public Cloud

– Model: Sell-with / Sell-through partnership with Verizon

– GTM: Enable Sales Teams/Resellers, Leads Pass-through, Billing integration

– Deployment: MobileFirst Protect Public Cloud– Support: MobileFirst Protect

IBM MobileFirst Protect Successful Partnership

33© 2015 IBM Corporation

Fully Brandable and Localizable Branding

– Self-service partner branding of portal• Logo, Product name, Favicon, Copyright, URLs, Email Sender,

Contact and support information– Trial registration page

• Logo, lead notification recipient– End user apps

• Custom development may be required

Localization– MaaS360 Portal and Apps

• English, German, Spanish, French, Italian, , Portuguese, Dutch,Russian, Japanese, Korean, Chinese (Simplified and Traditional)

33

34© 2015 IBM Corporation

MaaS360 Public Platform

• Hosted at maas360.com• Multi-tenant / Shared• Multi-tiered / Brandable• Zero infrastructure

• Hosted at SoftLayer• Single-tenant / Private• Multi-tiered / Brandable• Zero infrastructure• Hosting and setup fees

required

• 3 reference architectures• < 100,000 devices• 100K – 250K• 250K – 1M

• Hosted at Partner• Single-tenant / Private• Multi-tiered / Brandable• Infrastructure required• Setup fees required

• 3 reference architectures• < 100,000 devices• 100K – 250K• 250K – 1M

MaaS360 Hosted Platform

MaaS360 On-PremPlatform

IBM MobileFirst Protect (MaaS360) Deployment Models

35© 2015 IBM Corporation

Learn more about IBM Security

V2015-05-15

133 countries where IBM delivers managed security services

24 industry analyst reports rankIBM Security as a LEADER

TOP 3 enterprise security software vendor in total revenue

12K clients protected including…

22 of the top 29 banks in Japan, North America, and Europe

Visit our websiteIBM Security Website

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligence.com

Follow us on Twitter@ibmsecurity

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOUwww.ibm.com/security