SlideShare une entreprise Scribd logo
1  sur  10
1 IBM Security
A cognitive approach to enable endpoints,
end users and everything in between.
2 IBM Security
Traditional mobile device
management solutions were
built for a simpler time.
Today’s IT leaders
have bigger ambitions.
3 IBM Security
Cognitive technology gives IT and
security leaders the power to see:
• What happened
• What can happen
• What should be done
All in the context of your environment.
4 IBM Security
IBM MaaS360 with Watson offers a new approach.
• Digging through news & blogs randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best practices ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
5 IBM Security
Senior Product Manager, Enterprise Mobility
There is enormous potential in unified
endpoint management when you
incorporate cognitive technology like
Watson into MaaS360.
With this capability, we are able to get an
in-depth feel of our device landscape
instantly helping us make decisions faster
as to where we need to evolve the platform.
BRIAN JACOME
6 IBM Security
Unified Endpoint Management (UEM)
is the first step to enable today’s enterprise ecosystem.
Devices and things People and identity Apps and content
7 IBM Security
Traditional client management Modern API management+
Technology convergence is changing the game.
8 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Augmented intelligence and cognitive computing
Actionable insights Contextual analytics
Apps and content People and identity
Apps Content Data Identity Threats Connectivity
Devices and things
Smartphones Tablets Laptops Wearables Internet of Things
9 IBM Security
• Box App for UEM
̶ Pre-integrated with Box APIs
̶ Preserves the native Box app experience
̶ Controls access to content based on a user’s role or device security posture
̶ Includes user authentication, open-in restrictions, selective wipe and blocking user access
• Direct integration with IBM MaaS360 Container App
̶ Consolidates view of content repositories needed for work
̶ Enforces policies to ensure data is secure
̶ Includes user authentication, copy/paste restrictions and open-in to only authorized apps
IBM MaaS360 with Watson + Box enable access and security of content
10 IBM Security
Do more than manage endpoints.
Transform your
business with

Contenu connexe

Tendances

Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 

Tendances (19)

Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
Office 365 Mobile Device Management: What Is It, and Why Should You Care - Pa...
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
IBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahasIBM Security intelligence v1 - ahmed el nahas
IBM Security intelligence v1 - ahmed el nahas
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
Productivity Suite
Productivity SuiteProductivity Suite
Productivity Suite
 

En vedette

Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
 

En vedette (10)

MaaS 360
MaaS 360MaaS 360
MaaS 360
 
Cognitive Security Case Study
Cognitive Security Case StudyCognitive Security Case Study
Cognitive Security Case Study
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
IBM Payments Gateway
IBM Payments GatewayIBM Payments Gateway
IBM Payments Gateway
 
Technological Convergence - it-cafe
Technological Convergence - it-cafeTechnological Convergence - it-cafe
Technological Convergence - it-cafe
 
Cognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best FriendCognitive Security: How Artificial Intelligence is Your New Best Friend
Cognitive Security: How Artificial Intelligence is Your New Best Friend
 
report
reportreport
report
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Security
 
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
 

Similaire à IBM MaaS360 with Watson

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2
 

Similaire à IBM MaaS360 with Watson (20)

IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.netBig Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
Big Fix Q-Radar Ahmed Sharaf - EmbeddedSecurity.net
 
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 

Dernier

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

IBM MaaS360 with Watson

  • 1. 1 IBM Security A cognitive approach to enable endpoints, end users and everything in between.
  • 2. 2 IBM Security Traditional mobile device management solutions were built for a simpler time. Today’s IT leaders have bigger ambitions.
  • 3. 3 IBM Security Cognitive technology gives IT and security leaders the power to see: • What happened • What can happen • What should be done All in the context of your environment.
  • 4. 4 IBM Security IBM MaaS360 with Watson offers a new approach. • Digging through news & blogs randomly • Manually searching in platform DISCOVER • Being alerted with insights & news • Asking questions, getting answers • Spending hours learning DEFINE • Getting knowledge served to you • Fumbling for relevancy & best practices ASSESS • Gaining instant understanding & recommendations • Developing an action plan ACT • Taking immediate action within context GO FROM TO
  • 5. 5 IBM Security Senior Product Manager, Enterprise Mobility There is enormous potential in unified endpoint management when you incorporate cognitive technology like Watson into MaaS360. With this capability, we are able to get an in-depth feel of our device landscape instantly helping us make decisions faster as to where we need to evolve the platform. BRIAN JACOME
  • 6. 6 IBM Security Unified Endpoint Management (UEM) is the first step to enable today’s enterprise ecosystem. Devices and things People and identity Apps and content
  • 7. 7 IBM Security Traditional client management Modern API management+ Technology convergence is changing the game.
  • 8. 8 IBM Security IBM MaaS360 with Watson for cognitive UEM Augmented intelligence and cognitive computing Actionable insights Contextual analytics Apps and content People and identity Apps Content Data Identity Threats Connectivity Devices and things Smartphones Tablets Laptops Wearables Internet of Things
  • 9. 9 IBM Security • Box App for UEM ̶ Pre-integrated with Box APIs ̶ Preserves the native Box app experience ̶ Controls access to content based on a user’s role or device security posture ̶ Includes user authentication, open-in restrictions, selective wipe and blocking user access • Direct integration with IBM MaaS360 Container App ̶ Consolidates view of content repositories needed for work ̶ Enforces policies to ensure data is secure ̶ Includes user authentication, copy/paste restrictions and open-in to only authorized apps IBM MaaS360 with Watson + Box enable access and security of content
  • 10. 10 IBM Security Do more than manage endpoints. Transform your business with

Notes de l'éditeur

  1. Let me start with our point of view at IBM as it relates to mobile. Our mission is to enable apps and content with trust on any device, anytime, and anywhere. We do that by delivering secure mobile enablement for the way people work and collaborate with colleagues and customers. To us, secure enterprise mobility is about supporting the user’s expectations of being able to work remotely while having the flexibility to use the devices and apps of their choice. We execute on this by delivering IT and security pros the capabilities they need to: Extend mobile to new areas of the organization and use cases Provide end-to-end mobile security across devices, apps, content and users Combine mobile management with IT tools to build and deploy mobile apps at scale Reduce the cost and complexity of managing mobile assets Ensure compliance with policies and industry regulations With 6,000 mobile experts and more than 4,300 patents secured in mobile, social and security, IBM’s commitment to mobile is unmatched in the industry. These resources have been incorporated into solutions that enable enterprise clients to radically streamline and accelerate mobile adoption—helping organizations engage more people and capture new markets every day.
  2. Takeaway: IT Leaders can’t rely on tools that provide basic mobility management, while drowning in a sea of information, data and threats. IT Leaders once depended on mobile device management (MDM). Even as IT Leaders move onto different types of management systems, such as enterprise mobility management (EMM), businesses continue to have a limited view of their mobile, network, cloud and data center domains.   IT Leaders are awash in massive amounts of events and data across each domain, moving among the cloud, devices, apps and content. Apps are being developed and introduced at a rapid pace and with limited security best practices. Malware is becoming more prevalent and growing in frequency on mobile. At the same time, IT Leaders must meet compliance requirements in an increasingly regulated environment. To deliver a more unified security and management system that gives their team the flexibility they demand, IT Leaders need a better and smarter approach.
  3. Takeaway: The right platform can give IT Leaders the power to unleash their business’s potential. Enterprise digitalization will grant IT Leaders a distinctive vantage point, spanning infrastructure, business processes and intelligence. The IT Leaders of the future will be trained to optimize business processes to remain competitive. They will rely on security intelligence that can understand, reason and learn from human interactions with mobile technology. They will apply behavioral patterns detected by security intelligence to inform decisions about enterprise technology systems. And they will be open to change—so long as it’s rooted in solid, tested patterns. Cognitive capabilities will be part of the transformation because it can improve IT Leaders’ efficiency and insights by providing contextual best practices, productivity improvement opportunities and emerging threat alerts. Analogy => paper map to a fully connected GPS device Daily commute => Start your trip => multiple ways to get to work What happened => traffic incident What can happen => get stuck in X mins of traffic What should be done => Re-route to an alternative route Context => Where you are, how far you are from the incident, what other streets or exits are nearby
  4. Takeaway: IBM MaaS360 with Watson delivers insights and analytics to make it faster, easier and more effective to manage and secure endpoints – and their apps, data and content. MaaS360 with Watson provides insights and recommendations that empower you to: Discover best practices for user productivity, recommendations for IT optimization and potential security threats—delivered right to your MaaS360 dashboard Define what the insight is and why it is important for your organization Assess the impact of best practices or security risks to your devices, users, applications and more Act on the intelligence to unlock business opportunities or remediate security threats MaaS360 with Watson technology (examples/use cases): Detects malware on a specific version of an app, operating system or device Offers a link to resources such as security blogs, forums and tweets Tells you how many endpoints within your network are affected by new threats Offers suggestions for actions, such as "Block usage of XYZ app until the user updates to the latest version” Provides actionable insights for improved productivity and protection Offers context-driven best practices and recommendations All this allows you to: Improve user convenience by identifying productivity, policy and app opportunities Safeguard enterprise mobility by automatically discovering security vulnerabilities found in the marketplace Discover avenues of security improvement based on peer benchmarks and best practices Increase IT efficiency with automated delivery of contextual insights and recommendations
  5. Takeaway: Unified endpoint management (UEM) offers a comprehensive, highly secure platform that manages and protects Devices and Things (smartphones, tablets, laptops, desktops, wearables and IoT), People and Identity (authentication, authorization, Single Sign On, secure use access, and Apps and Content. UEM redefines user devices as endpoints and centralizes the management of those endpoints into a single application suite. UEM identifies malware and infected devices, wipes data from lost or stolen devices, gives employees the best apps to get their jobs done faster and more securely, flags outdated apps and sends updates over the air. But UEM is much more than allowing or denying access to network resources; it’s single sign-on management, user management, device management, device health checks, update management, resource management, device security, access control and app delivery. Using a UEM solution can transform your business by keeping your network resources and your business assets more secure while still providing the freedom your users need to creatively solve business problems with as few roadblocks as possible. However, with the exponential increase in endpoints, and the data from those devices and things, IT Leaders and their teams will be more challenged than ever to adequately manage and secure their users and data. The overwhelming amount of information and data requires a new and smarter approach to empower your team be more efficient, enable your employees to be more productive and help your corporate data to be more secure. UEM is just the first step to digital business transformation.
  6. Takeaway: Unified endpoint management (UEM) offers a comprehensive, highly secure platform that manages and protects Devices and Things (smartphones, tablets, laptops, desktops, wearables and IoT), People and Identity (authentication, authorization, Single Sign On, secure use access, and Apps and Content. UEM redefines user devices as endpoints and centralizes the management of those endpoints into a single application suite. UEM identifies malware and infected devices, wipes data from lost or stolen devices, gives employees the best apps to get their jobs done faster and more securely, flags outdated apps and sends updates over the air. But UEM is much more than allowing or denying access to network resources; it’s single sign-on management, user management, device management, device health checks, update management, resource management, device security, access control and app delivery. Using a UEM solution can transform your business by keeping your network resources and your business assets more secure while still providing the freedom your users need to creatively solve business problems with as few roadblocks as possible. However, with the exponential increase in endpoints, and the data from those devices and things, IT Leaders and their teams will be more challenged than ever to adequately manage and secure their users and data. The overwhelming amount of information and data requires a new and smarter approach to empower your team be more efficient, enable your employees to be more productive and help your corporate data to be more secure. UEM is just the first step to digital business transformation.
  7. Takeaway: IBM MaaS360 with Watson technology has unleashed an innovative approach to UEM that does more than manage and protect endpoints, users, applications, content and data.   Cognitive Insights can help organizations accelerate and maximize the return on investment (ROI) from their mobile strategies by: Identifying and leveraging digital transformation opportunities Reducing security risks Increasing the productivity of their workforce Boosting the efficiency of IT operations Helping the business make more informed decisions Cognitive endpoint management: Improve productivity by identifying policy and app deployment improvements Be alerted to security vulnerabilities when they are found in the marketplace Identify areas of security improvement based on peer benchmarks and best practices   App and content management: Feature-rich productivity suite and container support Unified enterprise app catalog Comprehensive app ecosystem aligning CxO, IT, line of business (LOB) and development Identity authentication: Simple and seamless access to authorized apps and content Single-sign-on and conditional access to enterprise resources Embedded identity provider or third-party integrations Security-rich and convenient access: Identify, isolate and remediate advanced threats Protect connectivity to enterprise resources Gain dynamic and holistic protection with security intelligence integrations