Download - Top 8 Reasons to Switch from MDM to EMM
© 2015 IBM Corporation
IBM Security
1 © 2015 IBM Corporation
Top 8 Reasons to Switch from MDM to EMM with IBM MobileFirst Protect (MaaS360)
Brian Adams, John Nielsen, Jimmy Tsang IBM Security June 17, 2015
© 2015 IBM Corporation
IBM Security
2
Introductions
Jimmy Tsang Product Marketing
IBM
Brian Adams Sales IBM
John Nielsen Product Management
IBM
© 2015 IBM Corporation
IBM Security
3
Agenda
Mobile trends in the enterprise
Top 8 reasons to switch from MDM to EMM
Demo
About IBM MobileFirst Protect
Q&A
© 2015 IBM Corporation
IBM Security
4
Poll question
Which MDM/EMM provider does your organization currently use?
A. MaaS360 / IBM MobileFirst Protect
B. AirWatch
C. MobileIron
D. Good Technology
E. Citrix
F. Microsoft
G. Other
H. None yet
5 © 2015 IBM Corporation
Mobile trends in the enterprise
© 2015 IBM Corporation
IBM Security
6
Mobile devices are essential for business and personal
Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014
87% have their smartphone at their side, day and night
78% spend over 2 hours a day using their smartphone
80% say the first thing they do in the morning is reach for their smartphone
Millennials and their smartphones…
46% say their smartphone is something they couldn’t live without
Source: “6 facts about Americans and their smartphones” by Pew Research Center, April 2015
87% By 2017, mobile devices will make up
of Internet-enabled technology total sales Source: Lander Blog, “Five Online Marketing Trends for 2014, April 2014
© 2015 IBM Corporation
IBM Security
7
App explosion in the enterprise is here and now
In 2014, the overall mobile app usage grew 76% Source: Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015
the number of apps the average enterprise has deployed to its employees
Source: Magic Quadrant for Enterprise Mobility Management Suites, Gartner, June 2015
Source: Gartner Press Release, May 2014
of all mobile security breaches are through apps 75%
8-15
© 2015 IBM Corporation
IBM Security
8
Surging demand for Content and Collaboration
Source: “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014
59% allow employees to share or collaborate on documents if the company provides the mobile device
on employee’s personally owned mobile devices (BYOD) 38%
48% have a clear policy for the adoption and use of cloud-based file sharing/file sync and share apps
have clear visibility into the file sharing/file sync and share apps used by employees at work 49%
© 2015 IBM Corporation
IBM Security
9
Analysts continue to see big things for mobile in the enterprise
“Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.”
“IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.”
EMM is the "Glue" “EMM is the starting point, if you are planning to opt into managing anything on a mobile platform.”
“Enterprise mobility … new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.”
© 2015 IBM Corporation
IBM Security
10
Mobile changes the way
people work
Mobile provides a better
experience
Mobile creates risk of company data
Mobile is strategic for business
© 2015 IBM Corporation
IBM Security
11
Mobile is complex and challenging to manage
Mobile mixes personal
and work
Mobile lives outside
your perimeter
Mobile is fast-paced and
multi-platform
© 2015 IBM Corporation
IBM Security
12
What IT and security pros are saying
“How do I ensure all devices accessing our network are secured and encrypted?”
“How do I enable my workforce with the right apps and user experience at the right time?”
Maximize Productivity Amplify Protection
“How do I manage the rapid deployment of devices in a cost-effective way?”
“How do I tie in to all my existing systems? I need to protect my investment!”
“How do I ensure authorized access to customer data and protect against threats?”
“How do I show that we are compliant with our policies and industry regulations?”
AND
CIO CISO
13 © 2015 IBM Corporation
Top 8 Reasons to Switch from MDM to EMM
© 2015 IBM Corporation
IBM Security
14
1. Use a single platform to manage devices, apps and content
© 2015 IBM Corporation
IBM Security
15
2. Integrate with existing enterprise systems and resources
File Systems
Web Apps
Lotus Traveler
Certificates
Office 365 Exchange ActiveSync
Active Directory/LDAP Network/Intranet
Box
Google Drive
SharePoint
IBM Connections
CMIS
Gmail
Web Services
IBM Secure Access Manager
QRadar risk & event detection
© 2015 IBM Corporation
IBM Security
16
3. Enable different classes of users, departments and geographies
A wide range
of use cases
BYOD/COPE/Shared
Kiosk mode
Public/Private apps
Persona policies
Data leak prevention
Blacklisting/whitelisting
URL filtering
File sync & share
Intranet access
Malware
© 2015 IBM Corporation
IBM Security
17
4. Secure work data and personal privacy with a native experience
© 2015 IBM Corporation
IBM Security
18
5. Automate your compliance rules and enforcement
Set granular security policies
Configure compliance rules engine
Automate near
real-time actions
© 2015 IBM Corporation
IBM Security
19
6. Support new OS and platform feature updates on release day
© 2015 IBM Corporation
IBM Security
20
7. Protect against advanced mobile security threats
Device risk data: • Malware found • Jailbreak or Root status • Suspicious system config
Install MaaS360 app with Trusteer, policies
& rules embedded
Policy & rules enforcement &
remediation
IBM MobileFirst Protect portal Trusteer Mobile Risk Engine
Over-the-air updates: • Malware definitions • Jailbreak & Root checks • Suspicious apps list
© 2015 IBM Corporation
IBM Security
21
8. Scales to meet the most demanding mobile environments
Executives
BYOD & Corporate
Want the latest devices & email
Sales
Multi-OS Security
Single department &
location enabled
Sales
Operations
Marketing
Apps & Content
Multiple departments & locations enabled
Sales
Finance/HR
Marketing
Engineering
Services
R&D
Business Transformation
Enterprise & global locations enabled
Operations
© 2015 IBM Corporation
IBM Security
22
Poll question
What solutions are you most interested in implementing for your organization’s mobile strategy? (check all that apply)
A. Mobile Device Management (MDM)
B. Mobile App Management (MAM)
C. Mobile Content Management (MCM) and Collaboration
D. Container solutions
E. Mobile Threat Management
23 © 2015 IBM Corporation
Demo See MobileFirst Protect in Action
© 2015 IBM Corporation
IBM Security
24
Enable apps and content with trust on any device, anytime, anywhere
Delivering mobile security for the way people work
© 2015 IBM Corporation
IBM Security
25
The IBM mobile security framework
CA, Oracle, RSA
Configure devices & manage security policies
Automate enforcement
Mitigate risks of lost or compromised devices
Distribute & manage enterprise apps
Separate work & personal data
Protect apps & data from vulnerabilities
Enable work content availability & sharing
Create & edit content
Contain sensitive corporate information
Provide secure web & mobile access control
Deliver ease-of-use with SSO & unified identity
management
Extend Security Intelligence
Extend security information & event management (SIEM) to mobile environment
Incorporate log management, anomaly detection, configuration & vulnerability management
Manage Access and Fraud
Secure Content and Collaboration
Safeguard Applications and Data
Protect Devices
© 2015 IBM Corporation
IBM Security
26
Complete mobility management and security
Advanced Management Visibility & Control
Secure Productivity Suite Trusted Workplace
Secure Document Sharing Content Collaboration
Mobile Threat Management Malware Protection
Mobile Enterprise Gateway Enterprise Access
© 2015 IBM Corporation
IBM Security
27
Unleash end-user productivity
Secure PIM App Security & Management
File Sync, Edit & Share
Secure Browser
Trusted Workplace
Separates work & personal data with anytime access to corporate resources
Works across iOS, Android, & Windows Phone platforms with a native user experience
Supports Microsoft, Google, IBM & other collaboration tools, apps & containers
© 2015 IBM Corporation
IBM Security
28
Robust mobile security platform
Mobile Threat Management
Trusteer Risk & Event
Detection
QRadar
Unified Endpoint Management
BigFix Mobile Identity Access Control
ISAM
Integrated App Security
Worklight Integrated
Data Security
Guardium
o Automated Policy Compliance o Encryption & Data Protection o Authentication & Restrictions o Containerization & App VPN o Device Quarantine & Wipe
© 2015 IBM Corporation
IBM Security
29
Why IBM MobileFirst Protect?
Integrated solutions that connect
seamlessly to your existing and external
environments
Scalable data security with intelligence for the
volume, speed, and variability of mobile
Complete management of
devices, apps, content and users from a single platform
© 2015 IBM Corporation
IBM Security
30
Commitment to customer success
Mobile Security
A large U.S. children’s hospital protects
3,000+ mobile devices
ensuring HIPAA compliance; installed and integrated
with existing servers in just
90 minutes
MobileFirst Protect
Mobile Productivity
A leading gaming and entertainment company
reduces customer wait time by
80% with tablets using a single
managed app to speed the time to deliver food and drinks to customers
MobileFirst Protect
© 2015 IBM Corporation
IBM Security
31
Industry analyst opinions
“Leader” in the Magic Quadrant Enterprise Mobility Management Suites for 4 years
“Best-in-class cloud” among ranked EMM vendors
“Leader” in the 2014 Forrester Wave for Enterprise Mobile Management “Highest” in Current Offering
“Champion” in the 2015 Enterprise Mobility Management Vendor Landscape Report
“Highest Value Score” of the vendor group.
“Leader” Worldwide Enterprise Mobility Management Software 2014 Vendor Assessment
© 2015 IBM Corporation
IBM Security
32
Get started now
Instant Access a free, fully functional trial for 30 days
Mobile Manage and secure your devices, apps and content
Easy Set up and configure your service in minutes
1 2 3
© 2015 IBM Corporation
IBM Security
33
© 2015 IBM Corporation
IBM Security
34
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.