SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Expanding the Vision of Enterprise Mobility
Management
Overview of IBM’s planned acquisition of
Fiberlink Communications
Analyst Briefing
November 2013

1

© 2013 IBM Corporation
Agenda
§  Announcing IBM’s intention to acquire
Fiberlink
§  How IBM and Fiberlink will expand the
definition of Enterprise Mobility Management
§  Who is Fiberlink and why Fiberlink
§  Fiberlink customer proof points
§  How IBM and Fiberlink will deliver a
comprehensive Mobility Solution
§  Summary and Analyst Relations contacts

2

© 2013 IBM Corporation
IBM research* identifies four Mobile entry points that all need
effective Management and Security
Create new value at the
moment of awareness

(CxO, LOB Exec)

Connect with
customers in context

Integrate mobile
into the fabric
of the organization

(CMO)

(CIO, CISO, IT Exec)

Develop and run applications

(VP Apps, Developer)
*Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts.
© 2013 IBM Corporation
Read the report at http://ibm.co/ibvmobile
IBM announces the intention to acquire Fiberlink
With Fiberlink, IBM will expand the vision of Enterprise Mobility Management
Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the
ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get
started in just minutes.

v  Extends IBM’s MobileFirst Technology
Platform
ü  An integrated enterprise mobile solution
ü  Eight (8) acquisitions in the last 18 months
ü  Innovative & Evolving (125 patents in 18 months)

v BYOD and Trusted Transactions
ü  Policy-based security
ü  Dual persona and Personal Information
Protection (Container)
ü  Mobile application, content, and document
management
ü  Next generation mobile security with Trusteer
ü  Malware and account take-over detection

v  Comprehensive mobile platform
ü 
ü 
ü 
ü 

Full mobile application lifecycle with Worklight
Unified device management
Seamless integration with enterprise technologies
Advanced and broad mobile OS support

v  Rapid time-to-value
ü  Enroll devices in less than 5 minutes with a SelfService cloud (SaaS Solution)
ü  Simple employee on-boarding capabilities
ü  Manage BYOD and corporate devices
ü  Reduce IT Help Desk dependencies
ü  Scales from 10s of devices to full Enterprise
deployments

ü  Backed by the IBM X-Force Threat Research
Team
4

© 2013 IBM Corporation
Who is Fiberlink?
§  Founded in 1991, Fiberlink has built expertise in delivering mobile
management and security as a service
§  Headquartered in Blue Bell, PA

§  Provides Mobile Device Management, Mobile Application Management,
Enterprise Container with SDK and App-Wrapping, Secure Document
Sharing and Mobile Expense Management as a Service helping enterprises
connect, control and secure mobile devices to gain competitive advantage,
increase employee productivity, and implement proper security measures
§  Industry leading and award winning
§ 
§ 
§ 
§ 

Cloud-based mobility management platform
Seamless integration with existing enterprise systems
Broad range of mobile OS support
Robust policies for Bring Your Own Device (BYOD) security and privacy

§  3500+ clients
§  Marquee financial, healthcare, public sector, education, and retail customers
§  Delivering value to enterprises of all sizes: small to large

5

© 2013 IBM Corporation
Why Fiberlink?
Lotus	
  

Device Management
& Security

AD/LDAP	
  

App Management
& Security

Exchange	
  

Enterprise DLP
& Security

BES	
  
Certs	
  

Simple

Seamless

and fast with an
exceptional experience

integration with
your infrastructure

SaaS implementation provided
100% Day Zero iOS7 support
in every customer environment

Comprehensive corporate
directory and email (On-Prem or
Cloud) integration in under an hour

Proven

approach to cloud
mobility
management
Only FISMA certified
MDM platform.

Comprehensive
layered security

A complete solution to
secure the device, the
app, and the data.

Reduce Management Cost

Improve Security Compliance
& Reduce Risk

Quickly deploy, enroll and
manage devices, apps and
docs with automatic updates
without additional hardware
costs or maintenance hassles.

6

Improve productivity &
employee satisfaction
Provide end-to-end
accessibility so your
employees can truly take the
business wherever they go.

Protect data by enforcing
policies and providing device
and application security on
BYOD and business-issued
devices.

© 2013 IBM Corporation
Fiberlink solutions deliver measureable business results
Desert Schools Federal Credit Union

CDW

Driving Down Costs

Reducing Risk, Improving Employee Satisfaction

Issue: Mobile device management solutions expensive
and difficult to implement.

Issue: Secure Corporate Owned and Employee Owned
Devices

Fiberlink solution provided:

Fiberlink solution provided:

§  Efficient mobile application management, resulting in 92%
time savings for IT

§  Increased employee satisfaction with ability to choose
their own devices

§  50% cost savings through the transfer of device
management responsibilities from Level 2 Engineers to
service desk employees

§  Self-enrollment of new devices by employees in only a few
minutes
§  IT saves 17-35 hours monthly on testing and enrolling
new devices

Eastman Chemical

U.S. Department of Commerce

Securing Mobile Devices

Maintaining Compliance

Issue: Rapid proliferation of unsecured, unmanaged
smartphones and tablet devices had the potential of
compromising sensitive corporate information.

Issue: Difficulty expanding mobile offerings while maintaining
compliance

Fiberlink solution provided:
§  Employee self-service enrollment and end user portal
for help desk functions
§  Ability to securely access corporate networks on popular
devices of their choosing
§  Employees access a catalog of public and private apps
on demand, and are alerted to updates as they occur
7

Fiberlink solution provided:
§  Integrated mobility management capabilities across
devices, apps and documents, delivering a more efficient
and secure infrastructure operations model.
§  Continuous monitoring, automated enforcement and
remediation on any device out of compliance with agency
policies.

© 2013 IBM Corporation
Fiberlink’s Mobile Management and Security Solution will enrich the
IBM MobileFirst Capabilities
Integrating Mobile into the fabric of your organization:
ü  Full application lifecycle to build, run, deploy and manage mobile applications
ü  Embedded security for mobile devices and applications to secure transactions
ü  Manage secure, sensitive data, regardless of the device
ü  Manage, track and optimize mobile expenses
Industry Solutions

Strategy & Design Services

Insurance!

Retail!

Transport!

Telecom!

Government!

Healthcare!

Automotive!

IBM & Partner Applications
Application & Data Platform

Management
Devices!

Security
Network!

Analytics
Servers!

Development & Integration Services

Banking!

Cloud & Managed Services

8

© 2013 IBM Corporation
The Fiberlink acquisition will continue to add momentum to IBM’s
MobileFirst strategy, helping to provide complete solutions for mobile
management and security.
1H 2013

1H 2012

IBM acquired:
IBM announced:
IBM acquired:

Emptoris Rivermine Telecom
Expense Management

IBM Endpoint Manager
for mobile devices

IBM MessageSight

IBM announced:

IBM acquired:

IBM acquired:

Trusteer

Tealeaf CX Mobile
IBM announced:

IBM Security Access
Manager for Cloud
and Mobile

2H 2012
9

IBM announced:

IBM acquired:
Urban Code DevOps
Platform

IBM Worklight

IBM announced:

IBM acquired:

IBM Connections Mobile

Xtify
IBM acquired:

The Now Factory

2H 2013
© 2013 IBM Corporation
With Fiberlink, only IBM will provide the full spectrum of mobile management
and security needs
Requirements for Mobile Management and Security:
Business Span
of Control
High

Low

Corporate Owned
Assets

Employees w/
BYOD

Task/Temp
Workers

Business Partners

Consumer
Transactions

Solution Approaches:
Mobile Device Management
Containers – App Wrapping and SDKs
Secure Transactions

IBM / Fiberlink Offerings:
IBM Security Access
Manager for Mobile
Planned Integration Points:
•  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight)
•  Security information and events will feed into QRadar for analysis and actions will return to mobile tools
(IBM QRadar)

•  Code scans will be integrated into the process before apps are deployed into app store/catalog
(IBM AppScan)
10

© 2013 IBM Corporation
Fiberlink will strengthen IBM mobile security framework for applications and devices
Trusted Transactions
Mobile Access Mgmt
Identity Federation
Application Level VPN
Secure API Connectivity
Malware & Fraud Detection
Device & Location Risk
Account Takeover
Jailbreak w Device Rooted

Security Intelligence
SIEM
Threat Research

Personal

Secure the Application

Enterprise
Applications

App Wrapping or SDK
iOS / Android Static Scanning
Worklight Mobile IDE
Experience Management
Tamper Proofing *partner
Enterprise
Container
Cloud Services

Secure the Device
Enroll w Configurew Monitor
Provision w Wipe w Fingerprint
11

© 2013 IBM Corporation
With Fiberlink, IBM will deliver first-class Unified Device Management
Continuously monitor the health and security of all enterprise computers and mobile devices in real-time
from a single console
•  SaaS, On-premise, or MSP

Endpoints

•  Scales from small to
enterprise class
environments
Desktop / laptop / server endpoint

Patch
Management

Lifecycle
Management

Mobile

Purpose specific

Software Use
Analysis

Mobile
Devices

•  Robust, flexible architecture
with built-in failover
•  Nearly-invisible impact to
network, endpoints
•  Operates in low-bandwidth /
high-latency environments

Power
Management

Core
Protection

Systems Management

Server
Automation

Security and
Compliance

•  Physical or virtual, network or
Internet-connected

Security Management

IBM Endpoint Manager / Fiberlink
12

© 2013 IBM Corporation
Summary and Contacts
§  IBM continues to invest in innovative technologies that deliver client value.
§  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise
Mobility Management.
§  Fiberlink provides mobile management and security capabilities that are proven, simple and
fast, with comprehensive layered security and seamless integration, delivered as a service
§  With Fiberlink, IBM will deliver:
–  Full application lifecycle to build, run, deploy and manage mobile applications
–  Next generation security for mobile devices, applications and trusted transactions
–  Unified device management solution for mobile, laptop, desktop and server.

§  We welcome your thoughts and feedback
Contact us with any questions or feedback
Ron Favali

IBM IT Analyst Relations

IBM Mobile Analyst Relations
favali@us.ibm.com

analyst@us.ibm.com
Web site: www.ibm.com/itanalyst

Wes Gyure
IBM Software, Cloud & Smarter Infrastructure
wgyure@us.ibm.com
13

© 2013 IBM Corporation
Twitter: #IBM #Fiberlink

© Copyright IBM Corporation 2013. All rights reserved. The information contained in
these materials is provided for informational purposes only, and is provided AS IS without
warranty of any kind, express or implied. IBM shall not be responsible for any damages
arising out of the use of, or otherwise related to, these materials. Nothing contained in these
materials is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and conditions of
the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in
these materials may change at any time at IBM’s sole discretion based on market
opportunities or other factors, and are not intended to be a commitment to future product or
feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the
Telelogic logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other
company, product, or service names may be trademarks or service marks of others.
14

© 2013 IBM Corporation

Contenu connexe

Tendances

Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
Mobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionMobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionLeigh Williamson
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM Events
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
Company presentation
Company presentationCompany presentation
Company presentationarunkuri
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...Foong Yen Lee
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 

Tendances (20)

Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
Mobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionMobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT Session
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 

Similaire à IBM Announce Intent to Acquire Fiberlink Analyst Presentation

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Vidyasagar Machupalli
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSteven Cull
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 

Similaire à IBM Announce Intent to Acquire Fiberlink Analyst Presentation (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solution
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
ZSS03120USEN.PDF
ZSS03120USEN.PDFZSS03120USEN.PDF
ZSS03120USEN.PDF
 

Dernier

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Dernier (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

IBM Announce Intent to Acquire Fiberlink Analyst Presentation

  • 1. Expanding the Vision of Enterprise Mobility Management Overview of IBM’s planned acquisition of Fiberlink Communications Analyst Briefing November 2013 1 © 2013 IBM Corporation
  • 2. Agenda §  Announcing IBM’s intention to acquire Fiberlink §  How IBM and Fiberlink will expand the definition of Enterprise Mobility Management §  Who is Fiberlink and why Fiberlink §  Fiberlink customer proof points §  How IBM and Fiberlink will deliver a comprehensive Mobility Solution §  Summary and Analyst Relations contacts 2 © 2013 IBM Corporation
  • 3. IBM research* identifies four Mobile entry points that all need effective Management and Security Create new value at the moment of awareness (CxO, LOB Exec) Connect with customers in context Integrate mobile into the fabric of the organization (CMO) (CIO, CISO, IT Exec) Develop and run applications (VP Apps, Developer) *Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts. © 2013 IBM Corporation Read the report at http://ibm.co/ibvmobile
  • 4. IBM announces the intention to acquire Fiberlink With Fiberlink, IBM will expand the vision of Enterprise Mobility Management Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get started in just minutes. v  Extends IBM’s MobileFirst Technology Platform ü  An integrated enterprise mobile solution ü  Eight (8) acquisitions in the last 18 months ü  Innovative & Evolving (125 patents in 18 months) v BYOD and Trusted Transactions ü  Policy-based security ü  Dual persona and Personal Information Protection (Container) ü  Mobile application, content, and document management ü  Next generation mobile security with Trusteer ü  Malware and account take-over detection v  Comprehensive mobile platform ü  ü  ü  ü  Full mobile application lifecycle with Worklight Unified device management Seamless integration with enterprise technologies Advanced and broad mobile OS support v  Rapid time-to-value ü  Enroll devices in less than 5 minutes with a SelfService cloud (SaaS Solution) ü  Simple employee on-boarding capabilities ü  Manage BYOD and corporate devices ü  Reduce IT Help Desk dependencies ü  Scales from 10s of devices to full Enterprise deployments ü  Backed by the IBM X-Force Threat Research Team 4 © 2013 IBM Corporation
  • 5. Who is Fiberlink? §  Founded in 1991, Fiberlink has built expertise in delivering mobile management and security as a service §  Headquartered in Blue Bell, PA §  Provides Mobile Device Management, Mobile Application Management, Enterprise Container with SDK and App-Wrapping, Secure Document Sharing and Mobile Expense Management as a Service helping enterprises connect, control and secure mobile devices to gain competitive advantage, increase employee productivity, and implement proper security measures §  Industry leading and award winning §  §  §  §  Cloud-based mobility management platform Seamless integration with existing enterprise systems Broad range of mobile OS support Robust policies for Bring Your Own Device (BYOD) security and privacy §  3500+ clients §  Marquee financial, healthcare, public sector, education, and retail customers §  Delivering value to enterprises of all sizes: small to large 5 © 2013 IBM Corporation
  • 6. Why Fiberlink? Lotus   Device Management & Security AD/LDAP   App Management & Security Exchange   Enterprise DLP & Security BES   Certs   Simple Seamless and fast with an exceptional experience integration with your infrastructure SaaS implementation provided 100% Day Zero iOS7 support in every customer environment Comprehensive corporate directory and email (On-Prem or Cloud) integration in under an hour Proven approach to cloud mobility management Only FISMA certified MDM platform. Comprehensive layered security A complete solution to secure the device, the app, and the data. Reduce Management Cost Improve Security Compliance & Reduce Risk Quickly deploy, enroll and manage devices, apps and docs with automatic updates without additional hardware costs or maintenance hassles. 6 Improve productivity & employee satisfaction Provide end-to-end accessibility so your employees can truly take the business wherever they go. Protect data by enforcing policies and providing device and application security on BYOD and business-issued devices. © 2013 IBM Corporation
  • 7. Fiberlink solutions deliver measureable business results Desert Schools Federal Credit Union CDW Driving Down Costs Reducing Risk, Improving Employee Satisfaction Issue: Mobile device management solutions expensive and difficult to implement. Issue: Secure Corporate Owned and Employee Owned Devices Fiberlink solution provided: Fiberlink solution provided: §  Efficient mobile application management, resulting in 92% time savings for IT §  Increased employee satisfaction with ability to choose their own devices §  50% cost savings through the transfer of device management responsibilities from Level 2 Engineers to service desk employees §  Self-enrollment of new devices by employees in only a few minutes §  IT saves 17-35 hours monthly on testing and enrolling new devices Eastman Chemical U.S. Department of Commerce Securing Mobile Devices Maintaining Compliance Issue: Rapid proliferation of unsecured, unmanaged smartphones and tablet devices had the potential of compromising sensitive corporate information. Issue: Difficulty expanding mobile offerings while maintaining compliance Fiberlink solution provided: §  Employee self-service enrollment and end user portal for help desk functions §  Ability to securely access corporate networks on popular devices of their choosing §  Employees access a catalog of public and private apps on demand, and are alerted to updates as they occur 7 Fiberlink solution provided: §  Integrated mobility management capabilities across devices, apps and documents, delivering a more efficient and secure infrastructure operations model. §  Continuous monitoring, automated enforcement and remediation on any device out of compliance with agency policies. © 2013 IBM Corporation
  • 8. Fiberlink’s Mobile Management and Security Solution will enrich the IBM MobileFirst Capabilities Integrating Mobile into the fabric of your organization: ü  Full application lifecycle to build, run, deploy and manage mobile applications ü  Embedded security for mobile devices and applications to secure transactions ü  Manage secure, sensitive data, regardless of the device ü  Manage, track and optimize mobile expenses Industry Solutions Strategy & Design Services Insurance! Retail! Transport! Telecom! Government! Healthcare! Automotive! IBM & Partner Applications Application & Data Platform Management Devices! Security Network! Analytics Servers! Development & Integration Services Banking! Cloud & Managed Services 8 © 2013 IBM Corporation
  • 9. The Fiberlink acquisition will continue to add momentum to IBM’s MobileFirst strategy, helping to provide complete solutions for mobile management and security. 1H 2013 1H 2012 IBM acquired: IBM announced: IBM acquired: Emptoris Rivermine Telecom Expense Management IBM Endpoint Manager for mobile devices IBM MessageSight IBM announced: IBM acquired: IBM acquired: Trusteer Tealeaf CX Mobile IBM announced: IBM Security Access Manager for Cloud and Mobile 2H 2012 9 IBM announced: IBM acquired: Urban Code DevOps Platform IBM Worklight IBM announced: IBM acquired: IBM Connections Mobile Xtify IBM acquired: The Now Factory 2H 2013 © 2013 IBM Corporation
  • 10. With Fiberlink, only IBM will provide the full spectrum of mobile management and security needs Requirements for Mobile Management and Security: Business Span of Control High Low Corporate Owned Assets Employees w/ BYOD Task/Temp Workers Business Partners Consumer Transactions Solution Approaches: Mobile Device Management Containers – App Wrapping and SDKs Secure Transactions IBM / Fiberlink Offerings: IBM Security Access Manager for Mobile Planned Integration Points: •  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight) •  Security information and events will feed into QRadar for analysis and actions will return to mobile tools (IBM QRadar) •  Code scans will be integrated into the process before apps are deployed into app store/catalog (IBM AppScan) 10 © 2013 IBM Corporation
  • 11. Fiberlink will strengthen IBM mobile security framework for applications and devices Trusted Transactions Mobile Access Mgmt Identity Federation Application Level VPN Secure API Connectivity Malware & Fraud Detection Device & Location Risk Account Takeover Jailbreak w Device Rooted Security Intelligence SIEM Threat Research Personal Secure the Application Enterprise Applications App Wrapping or SDK iOS / Android Static Scanning Worklight Mobile IDE Experience Management Tamper Proofing *partner Enterprise Container Cloud Services Secure the Device Enroll w Configurew Monitor Provision w Wipe w Fingerprint 11 © 2013 IBM Corporation
  • 12. With Fiberlink, IBM will deliver first-class Unified Device Management Continuously monitor the health and security of all enterprise computers and mobile devices in real-time from a single console •  SaaS, On-premise, or MSP Endpoints •  Scales from small to enterprise class environments Desktop / laptop / server endpoint Patch Management Lifecycle Management Mobile Purpose specific Software Use Analysis Mobile Devices •  Robust, flexible architecture with built-in failover •  Nearly-invisible impact to network, endpoints •  Operates in low-bandwidth / high-latency environments Power Management Core Protection Systems Management Server Automation Security and Compliance •  Physical or virtual, network or Internet-connected Security Management IBM Endpoint Manager / Fiberlink 12 © 2013 IBM Corporation
  • 13. Summary and Contacts §  IBM continues to invest in innovative technologies that deliver client value. §  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise Mobility Management. §  Fiberlink provides mobile management and security capabilities that are proven, simple and fast, with comprehensive layered security and seamless integration, delivered as a service §  With Fiberlink, IBM will deliver: –  Full application lifecycle to build, run, deploy and manage mobile applications –  Next generation security for mobile devices, applications and trusted transactions –  Unified device management solution for mobile, laptop, desktop and server. §  We welcome your thoughts and feedback Contact us with any questions or feedback Ron Favali IBM IT Analyst Relations IBM Mobile Analyst Relations favali@us.ibm.com analyst@us.ibm.com Web site: www.ibm.com/itanalyst Wes Gyure IBM Software, Cloud & Smarter Infrastructure wgyure@us.ibm.com 13 © 2013 IBM Corporation
  • 14. Twitter: #IBM #Fiberlink © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 14 © 2013 IBM Corporation