SlideShare une entreprise Scribd logo
1  sur  34
© 2016 IBM Corporation
IBM MaaS360 Massively Reimagines EMM
New App Research and
Enterprise App Adoption Explored
Clint Adams
Product Management
IBM Security
Jimmy Tsang
Product Marketing
IBM Security
2© 2016 IBM Corporation
Housekeeping items
 Duration – 60 minutes
 Submit your questions to all
panelists in the Q&A box located
in the bottom right corner of your
screen
 Recording and slides will be
emailed to you
3© 2016 IBM Corporation
Agenda
 Mobility overview and trends
 2016 Mobile Security and Business Transformation study
 Inside IBM MaaS360 massive app stats
 Reimagining the enterprise app catalog + DEMO
 Reimagining the corporate container experience + DEMO
 About MaaS360
 Q&A
4© 2016 IBM Corporation
Poll question
 How many unique mobile apps (public and
private) has your organization deployed to
its employees using an enterprise app
catalog?
A. > 100
B. 50 – 100
C. 1 – 49
D. Just getting started or not yet
5© 2016 IBM Corporation
Mobility is everywhere in our work and personal lives
Saving lives
Improving care
Busting lines Making safe landings
Heading homeLearning in class
6© 2016 IBM Corporation
Mobile is complex and challenging
Mobile users
Varying work styles
Native experience
Privacy concerns
Fast pace of change
CIO/CISO
Enable business
Information sprawl
Data security
Business visibility
Awash in data
Mobile blind spots
Compliance reporting
Content
access
App
explosion
Device choice
& email
7© 2016 IBM Corporation
Expanding needs for the mobile enterprise
User
enablement
Support more devices
& usage models
Deliver best-of-breed
apps & experience
Connect with core
enterprise systems
Data
protection
Secure data in apps,
cloud & in motion
Enforce policies
& configuration
Integrate identity &
access controls
Actionable
insights
Gain a complete
view of activity
Understand user
behaviors
Enable automation &
threat detection
8© 2016 IBM Corporation
Productivity and protection without compromise
CIO
LOB
CISO
“How do I enable
my workforce with
the right apps and
user experience at
the right time?”
“How do I ensure
authorized access
to customer data
and protect
against threats?”
“How do I manage
the rapid
deployment of
devices in a cost-
effective way?”
9© 2016 IBM Corporation
2016 Mobile Security and Business Transformation Study
 Survey of over 200 respondents
 Conducted by iSMG (Information Security
Media Group) and sponsored by IBM
 Examines how mobility has transformed
how enterprises conduct – and secure –
business
– Impact of mobility on global enterprises
– Current state of mobile security, and how
enterprises will improve it in 2016
10© 2016 IBM Corporation
Mobility is strategic for every organization today
11© 2016 IBM Corporation
But are organizations ready for massive mobile adoption?
12© 2016 IBM Corporation
Nevertheless, organizations are investing in technology and security
securing content
and collaboration
access and
fraud measures
13© 2016 IBM Corporation
Mobile apps rule! – Inside IBM MaaS360 massive app stats
© 2016 IBM Corporation
IBM MaaS360 Reimagines EMM
15© 2016 IBM Corporation
MaaS360 Enhancement Themes
Ease of Deployment
& Use
Native Consumer
Experience
Rapid Adoption
& Scalability
16© 2016 IBM Corporation
 Custom enterprise app catalogs
 App security & compliance
management
 Distribute & update apps
 Selectively remove managed apps
 Volume Purchase Program
management
 App Cloud for hosting &
distribution
IBM MaaS360 Mobile Application Management
17© 2016 IBM Corporation
 New look and feel for iPhones, iPads and Android devices
– Similar to native App Store user experience
– In collaboration with Apple & Google designers
– Keeps app info up-to-date with public app store
 Simplify discovery of relevant apps
– Intuitive search, sort, filter, multiple tabs
– Highlights recently added and most popular apps
– Rate and review apps to give feedback
 Promote key apps for users
– App Bundles to logically group apps
– Featured, New, and App Bundles draw users’ attention
– Display similar apps to help users find the right one
 Manage at scale
– Quickly create and distribute app bundles for one touch installation
Unmatched App UX in EMM industry
Reimagining the enterprise app catalog – iOS and Android
18© 2016 IBM Corporation
 Ideal for medium to large enterprises
– IT teams that deploy more than 20 apps to users
 Adds many new and advanced features
– App Bundles
– Featured Apps & Bundles
– Similar Apps
– Multiple Tabs
– …and all of the upgraded features to aid in the
discovery of relevant apps
New App Catalogs – Advanced Mode
19© 2016 IBM Corporation
 Ideal for small & medium companies
– IT teams that deploy less than 20 apps to users
 Simple, clean app experience with upgraded
features
– Single app list
– Intuitive search, sort, filter
– Highlights recent and most popular apps
– Easy navigation between categories
New App Catalogs – Simple Mode
© 2016 IBM Corporation
New App Catalog Experience Demo
21© 2016 IBM Corporation
Unleashing end-user productivity with our secure container
Secure PIM
App Security &
Management
File Sync,
Edit & Share
Secure
Browser
Trusted Workplace
Separates work &
personal data with
anytime access to
corporate resources
Works across iOS,
Android & Windows
mobile platforms with a
native user experience
Supports Microsoft,
Google, IBM, Box &
other collaboration tools,
apps & containers
22© 2016 IBM Corporation
Reimagining the corporate container experience
Simplifies mobile working on iOS and
Android devices, making life easier for users
while securing enterprise data
 Native-like, consumer UX
 Switch seamlessly between email, calendar
and documents for nimble multi-tasking
 Extensive swipe gestures have been added for
more natural navigation and quicker actions
 Single touch functionality to join conference
calls and web meetings
 Enhanced mail and calendar search
 Better readability for email, calendar and
documents
© 2016 IBM Corporation
New Container Experiences Demo
24© 2016 IBM Corporation
Poll question
 Would you consider using a secure
corporate container in your BYOD
deployments?
A. Already have one deployed
B. Yes, actively considering it
C. Maybe, need more research
D. No, not at this time
25© 2016 IBM Corporation
MaaS360 App on IBM Security App Exchange – 1st in EMM industry
26© 2016 IBM Corporation
Gain insight and intelligence of mobile risk events
https://exchange.xforce.ibmcloud.com/hub
27© 2016 IBM Corporation
 Continuous Mobile Visibility
– Detect when smartphones and tablets are attempting to connect to the network
– Monitor enrollment of personally owned and corporate-liable devices
– Gain awareness of unauthorized devices
– Learn when users install blacklisted apps and access restricted websites
 Compromised Device Remediation
– Uncover devices infected with malware before they compromise your enterprise data
– Identify jailbroken iOS devices and rooted Android devices
– Set security policies and compliance rules to automate remediation
– Block access, or perform a selective wipe or full wipe of compromised devices
View IBM MaaS360 compliance rule violations through IBM Security QRadar
IBM Security QRadar integration with IBM MaaS360
© 2016 IBM Corporation
About IBM MaaS360
29© 2016 IBM Corporation
Complete enterprise mobility management
Productivity Suite
Trusted Workplace
Content Suite
Secure Collaboration
Threat
Management
Malware Protection
Gateway Suite
Enterprise Access
Management Suite
Visibility & Control
A flexible, integrated platform that
meets diverse mobile use cases
Devices Apps Container
ThreatsContent Networks
30© 2016 IBM Corporation
Platform for strong mobile security
Mobile Threat
Management
Risk & Event
Detection
Unified Endpoint
Management
Mobile Identity
Management
Integrated App
Security
App Vulnerability &
Reputation
Automated Policy Compliance
Encryption & Data Protection
Authentication & Restrictions
Containerization & App VPN
Device Quarantine & Wipe
31© 2016 IBM Corporation
Benefits of using IBM MaaS360
Easily manage your
devices
See all your devices in one
place and remotely manage
right over-the-air (OTA)
Quickly deploy private
and public apps
Promote, distribute and update
approved apps using an
interactive catalog
Collaborate with content
on-the-go
Mobilize content and files to stay
productive anytime, anywhere
Keep apps and data secure
Help users get the information they
need without risk of data leakage
Simply connect to business systems
Integrate with enterprise systems so you can use
existing infrastructure and data repositories
32© 2016 IBM Corporation
Next steps
Demo
Participate in a
deep-dive demo
with our experts
Deploy
Start managing and
securing your mobile
environment
Evaluate
Set up and
configure your
custom trial service
1 2 3
www.ibm.com/maas360
33© 2016 IBM Corporation
Q&A
?
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security

Contenu connexe

Tendances

Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcNitin Gaur
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleAGILLY
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixIT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixCarl Osipov
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 

Tendances (19)

Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Ibm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dcIbm mobile first digital_strategy_dc
Ibm mobile first digital_strategy_dc
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
iOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le ContrôleiOS 9 : Redéfinir la Collaboration et le Contrôle
iOS 9 : Redéfinir la Collaboration et le Contrôle
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM BluemixIT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 

En vedette

พ.อ.ดร.เศรษฐพงค์ 4 G impact
พ.อ.ดร.เศรษฐพงค์   4 G impactพ.อ.ดร.เศรษฐพงค์   4 G impact
พ.อ.ดร.เศรษฐพงค์ 4 G impactSettapong-Broadband
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...Alfonso Mallia
 
Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Mohammad Mahin Khan
 
Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Robert McCray
 
NoSQL (ELEKS DevTalks #1 - Jan 2015)
NoSQL (ELEKS DevTalks #1 - Jan 2015)NoSQL (ELEKS DevTalks #1 - Jan 2015)
NoSQL (ELEKS DevTalks #1 - Jan 2015)Yuriy Guts
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017AGILLY
 
Gene expression group presentation at GAW 19
Gene expression group presentation at GAW 19Gene expression group presentation at GAW 19
Gene expression group presentation at GAW 19Francesco Gadaleta
 
[JEEConf 2015] Lessons from Building a Modern B2C System in Scala
[JEEConf 2015] Lessons from Building a Modern B2C System in Scala[JEEConf 2015] Lessons from Building a Modern B2C System in Scala
[JEEConf 2015] Lessons from Building a Modern B2C System in ScalaYuriy Guts
 
A Developer Overview of Redis
A Developer Overview of RedisA Developer Overview of Redis
A Developer Overview of RedisYuriy Guts
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueAGILLY
 
Applying NLP to product comparison at visual meta
Applying NLP to product comparison at visual metaApplying NLP to product comparison at visual meta
Applying NLP to product comparison at visual metaRoss Turner
 
Experiments with Machine Learning - GDG Lviv
Experiments with Machine Learning - GDG LvivExperiments with Machine Learning - GDG Lviv
Experiments with Machine Learning - GDG LvivYuriy Guts
 
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)Word embeddings et leurs applications (Meetup TDS, 2016-06-30)
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)Camille Pradel
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protectAGILLY
 

En vedette (19)

พ.อ.ดร.เศรษฐพงค์ 4 G impact
พ.อ.ดร.เศรษฐพงค์   4 G impactพ.อ.ดร.เศรษฐพงค์   4 G impact
พ.อ.ดร.เศรษฐพงค์ 4 G impact
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
La mia scuola alfonso mallia, gabriele mossuto, calogero racinello, angelo no...
 
Kishor CV Ultra
Kishor CV UltraKishor CV Ultra
Kishor CV Ultra
 
Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...Agricultural information dissemination through modern technology will effect ...
Agricultural information dissemination through modern technology will effect ...
 
Resume R_McCray FEB 2016
Resume R_McCray FEB 2016Resume R_McCray FEB 2016
Resume R_McCray FEB 2016
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
 
NoSQL (ELEKS DevTalks #1 - Jan 2015)
NoSQL (ELEKS DevTalks #1 - Jan 2015)NoSQL (ELEKS DevTalks #1 - Jan 2015)
NoSQL (ELEKS DevTalks #1 - Jan 2015)
 
Network genetics
Network geneticsNetwork genetics
Network genetics
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
 
Gene expression group presentation at GAW 19
Gene expression group presentation at GAW 19Gene expression group presentation at GAW 19
Gene expression group presentation at GAW 19
 
[JEEConf 2015] Lessons from Building a Modern B2C System in Scala
[JEEConf 2015] Lessons from Building a Modern B2C System in Scala[JEEConf 2015] Lessons from Building a Modern B2C System in Scala
[JEEConf 2015] Lessons from Building a Modern B2C System in Scala
 
A Developer Overview of Redis
A Developer Overview of RedisA Developer Overview of Redis
A Developer Overview of Redis
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
 
Applying NLP to product comparison at visual meta
Applying NLP to product comparison at visual metaApplying NLP to product comparison at visual meta
Applying NLP to product comparison at visual meta
 
Experiments with Machine Learning - GDG Lviv
Experiments with Machine Learning - GDG LvivExperiments with Machine Learning - GDG Lviv
Experiments with Machine Learning - GDG Lviv
 
An Introduction to Networks
An Introduction to NetworksAn Introduction to Networks
An Introduction to Networks
 
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)Word embeddings et leurs applications (Meetup TDS, 2016-06-30)
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
 

Similaire à Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises

Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netxband
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overviewAjay Chebbi
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationAjay Chebbi
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloNorth Texas Chapter of the ISSA
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationmoldovaictsummit2016
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche AGILLY
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsIBM Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Management in a Cloud Centric World – The NEW Business Paradigm
  Management in a Cloud Centric World – The NEW Business Paradigm  Management in a Cloud Centric World – The NEW Business Paradigm
Management in a Cloud Centric World – The NEW Business ParadigmResellerClub
 
Enterprise Mobile Success with Oracle and Xamarin
Enterprise Mobile Success with Oracle and XamarinEnterprise Mobile Success with Oracle and Xamarin
Enterprise Mobile Success with Oracle and XamarinXamarin
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 

Similaire à Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises (20)

Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
IBM Mobile foundation overview
IBM Mobile foundation overviewIBM Mobile foundation overview
IBM Mobile foundation overview
 
Make Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst FoundationMake Good Apps great - Using IBM MobileFirst Foundation
Make Good Apps great - Using IBM MobileFirst Foundation
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Entreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformationEntreprise mobility approach within digital transformation
Entreprise mobility approach within digital transformation
 
Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche Android for Work Sécurité Mobile avancée dans la poche
Android for Work Sécurité Mobile avancée dans la poche
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Management in a Cloud Centric World – The NEW Business Paradigm
  Management in a Cloud Centric World – The NEW Business Paradigm  Management in a Cloud Centric World – The NEW Business Paradigm
Management in a Cloud Centric World – The NEW Business Paradigm
 
Enterprise Mobile Success with Oracle and Xamarin
Enterprise Mobile Success with Oracle and XamarinEnterprise Mobile Success with Oracle and Xamarin
Enterprise Mobile Success with Oracle and Xamarin
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 

Plus de AGILLY

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...AGILLY
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfAGILLY
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloudAGILLY
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAGILLY
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile frAGILLY
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief frAGILLY
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationAGILLY
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?AGILLY
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix OverviewAGILLY
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : ProtectAGILLY
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016AGILLY
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementAGILLY
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 

Plus de AGILLY (20)

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
 
IBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrementIBM Verse & Connections Cloud : Travailler autrement
IBM Verse & Connections Cloud : Travailler autrement
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 

Dernier

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Dernier (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises

  • 1. © 2016 IBM Corporation IBM MaaS360 Massively Reimagines EMM New App Research and Enterprise App Adoption Explored Clint Adams Product Management IBM Security Jimmy Tsang Product Marketing IBM Security
  • 2. 2© 2016 IBM Corporation Housekeeping items  Duration – 60 minutes  Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen  Recording and slides will be emailed to you
  • 3. 3© 2016 IBM Corporation Agenda  Mobility overview and trends  2016 Mobile Security and Business Transformation study  Inside IBM MaaS360 massive app stats  Reimagining the enterprise app catalog + DEMO  Reimagining the corporate container experience + DEMO  About MaaS360  Q&A
  • 4. 4© 2016 IBM Corporation Poll question  How many unique mobile apps (public and private) has your organization deployed to its employees using an enterprise app catalog? A. > 100 B. 50 – 100 C. 1 – 49 D. Just getting started or not yet
  • 5. 5© 2016 IBM Corporation Mobility is everywhere in our work and personal lives Saving lives Improving care Busting lines Making safe landings Heading homeLearning in class
  • 6. 6© 2016 IBM Corporation Mobile is complex and challenging Mobile users Varying work styles Native experience Privacy concerns Fast pace of change CIO/CISO Enable business Information sprawl Data security Business visibility Awash in data Mobile blind spots Compliance reporting Content access App explosion Device choice & email
  • 7. 7© 2016 IBM Corporation Expanding needs for the mobile enterprise User enablement Support more devices & usage models Deliver best-of-breed apps & experience Connect with core enterprise systems Data protection Secure data in apps, cloud & in motion Enforce policies & configuration Integrate identity & access controls Actionable insights Gain a complete view of activity Understand user behaviors Enable automation & threat detection
  • 8. 8© 2016 IBM Corporation Productivity and protection without compromise CIO LOB CISO “How do I enable my workforce with the right apps and user experience at the right time?” “How do I ensure authorized access to customer data and protect against threats?” “How do I manage the rapid deployment of devices in a cost- effective way?”
  • 9. 9© 2016 IBM Corporation 2016 Mobile Security and Business Transformation Study  Survey of over 200 respondents  Conducted by iSMG (Information Security Media Group) and sponsored by IBM  Examines how mobility has transformed how enterprises conduct – and secure – business – Impact of mobility on global enterprises – Current state of mobile security, and how enterprises will improve it in 2016
  • 10. 10© 2016 IBM Corporation Mobility is strategic for every organization today
  • 11. 11© 2016 IBM Corporation But are organizations ready for massive mobile adoption?
  • 12. 12© 2016 IBM Corporation Nevertheless, organizations are investing in technology and security securing content and collaboration access and fraud measures
  • 13. 13© 2016 IBM Corporation Mobile apps rule! – Inside IBM MaaS360 massive app stats
  • 14. © 2016 IBM Corporation IBM MaaS360 Reimagines EMM
  • 15. 15© 2016 IBM Corporation MaaS360 Enhancement Themes Ease of Deployment & Use Native Consumer Experience Rapid Adoption & Scalability
  • 16. 16© 2016 IBM Corporation  Custom enterprise app catalogs  App security & compliance management  Distribute & update apps  Selectively remove managed apps  Volume Purchase Program management  App Cloud for hosting & distribution IBM MaaS360 Mobile Application Management
  • 17. 17© 2016 IBM Corporation  New look and feel for iPhones, iPads and Android devices – Similar to native App Store user experience – In collaboration with Apple & Google designers – Keeps app info up-to-date with public app store  Simplify discovery of relevant apps – Intuitive search, sort, filter, multiple tabs – Highlights recently added and most popular apps – Rate and review apps to give feedback  Promote key apps for users – App Bundles to logically group apps – Featured, New, and App Bundles draw users’ attention – Display similar apps to help users find the right one  Manage at scale – Quickly create and distribute app bundles for one touch installation Unmatched App UX in EMM industry Reimagining the enterprise app catalog – iOS and Android
  • 18. 18© 2016 IBM Corporation  Ideal for medium to large enterprises – IT teams that deploy more than 20 apps to users  Adds many new and advanced features – App Bundles – Featured Apps & Bundles – Similar Apps – Multiple Tabs – …and all of the upgraded features to aid in the discovery of relevant apps New App Catalogs – Advanced Mode
  • 19. 19© 2016 IBM Corporation  Ideal for small & medium companies – IT teams that deploy less than 20 apps to users  Simple, clean app experience with upgraded features – Single app list – Intuitive search, sort, filter – Highlights recent and most popular apps – Easy navigation between categories New App Catalogs – Simple Mode
  • 20. © 2016 IBM Corporation New App Catalog Experience Demo
  • 21. 21© 2016 IBM Corporation Unleashing end-user productivity with our secure container Secure PIM App Security & Management File Sync, Edit & Share Secure Browser Trusted Workplace Separates work & personal data with anytime access to corporate resources Works across iOS, Android & Windows mobile platforms with a native user experience Supports Microsoft, Google, IBM, Box & other collaboration tools, apps & containers
  • 22. 22© 2016 IBM Corporation Reimagining the corporate container experience Simplifies mobile working on iOS and Android devices, making life easier for users while securing enterprise data  Native-like, consumer UX  Switch seamlessly between email, calendar and documents for nimble multi-tasking  Extensive swipe gestures have been added for more natural navigation and quicker actions  Single touch functionality to join conference calls and web meetings  Enhanced mail and calendar search  Better readability for email, calendar and documents
  • 23. © 2016 IBM Corporation New Container Experiences Demo
  • 24. 24© 2016 IBM Corporation Poll question  Would you consider using a secure corporate container in your BYOD deployments? A. Already have one deployed B. Yes, actively considering it C. Maybe, need more research D. No, not at this time
  • 25. 25© 2016 IBM Corporation MaaS360 App on IBM Security App Exchange – 1st in EMM industry
  • 26. 26© 2016 IBM Corporation Gain insight and intelligence of mobile risk events https://exchange.xforce.ibmcloud.com/hub
  • 27. 27© 2016 IBM Corporation  Continuous Mobile Visibility – Detect when smartphones and tablets are attempting to connect to the network – Monitor enrollment of personally owned and corporate-liable devices – Gain awareness of unauthorized devices – Learn when users install blacklisted apps and access restricted websites  Compromised Device Remediation – Uncover devices infected with malware before they compromise your enterprise data – Identify jailbroken iOS devices and rooted Android devices – Set security policies and compliance rules to automate remediation – Block access, or perform a selective wipe or full wipe of compromised devices View IBM MaaS360 compliance rule violations through IBM Security QRadar IBM Security QRadar integration with IBM MaaS360
  • 28. © 2016 IBM Corporation About IBM MaaS360
  • 29. 29© 2016 IBM Corporation Complete enterprise mobility management Productivity Suite Trusted Workplace Content Suite Secure Collaboration Threat Management Malware Protection Gateway Suite Enterprise Access Management Suite Visibility & Control A flexible, integrated platform that meets diverse mobile use cases Devices Apps Container ThreatsContent Networks
  • 30. 30© 2016 IBM Corporation Platform for strong mobile security Mobile Threat Management Risk & Event Detection Unified Endpoint Management Mobile Identity Management Integrated App Security App Vulnerability & Reputation Automated Policy Compliance Encryption & Data Protection Authentication & Restrictions Containerization & App VPN Device Quarantine & Wipe
  • 31. 31© 2016 IBM Corporation Benefits of using IBM MaaS360 Easily manage your devices See all your devices in one place and remotely manage right over-the-air (OTA) Quickly deploy private and public apps Promote, distribute and update approved apps using an interactive catalog Collaborate with content on-the-go Mobilize content and files to stay productive anytime, anywhere Keep apps and data secure Help users get the information they need without risk of data leakage Simply connect to business systems Integrate with enterprise systems so you can use existing infrastructure and data repositories
  • 32. 32© 2016 IBM Corporation Next steps Demo Participate in a deep-dive demo with our experts Deploy Start managing and securing your mobile environment Evaluate Set up and configure your custom trial service 1 2 3 www.ibm.com/maas360
  • 33. 33© 2016 IBM Corporation Q&A ?
  • 34. © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security