SlideShare uma empresa Scribd logo
1 de 18
Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2  ROI without Compromising Security, Management or Compliance
Introducing FaceTime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some reasons for delayed decision / deployment Non–Compliance Exposure Corporate Acceptable Usage Policies, FSA, SOX, SEC 17a, NASD,  HIPAA, GLBA Liability, Freedom of Information Companies Act 2006, MiFID Increasingly Complex ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Growth in IM/P2P threats Credit card #, NI#, Patient Health Info, Company Intellectual Property Information Leakage
So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries /  Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/  Archiving Auditing / Discovery Data Integrity Exporting Policies
Companies are Responding by Deploying Unified Communications ,[object Object],[object Object],Security and compliance are key concerns …  Resulting in a Heterogeneous Environment
Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Must-Have” Requirements for Unified Communications
FaceTime ,[object Object],Content Control /Security Compliance & Discovery Management & Reporting Application Visibility / Control
FaceTime Product Portfolio
FaceTime Complements IBM Sametime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY
How does this help sell more licences for IBM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Don’t let any of the following stop / delay your deal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Customer and Project examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How the FaceTime team can support you ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
Questions?

Mais conteúdo relacionado

Mais procurados

Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Companyexpetec
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Steering microservices with istio
Steering microservices with istioSteering microservices with istio
Steering microservices with istioHemanth Malla
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 SlidecastKieng Iv
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 

Mais procurados (19)

Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate Profile
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Company
 
F-Secure Corporation
F-Secure CorporationF-Secure Corporation
F-Secure Corporation
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Emerging trends in it
Emerging trends in itEmerging trends in it
Emerging trends in it
 
Data com
Data comData com
Data com
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
CCNSE
CCNSECCNSE
CCNSE
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Evolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance RegulationsEvolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance Regulations
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Steering microservices with istio
Steering microservices with istioSteering microservices with istio
Steering microservices with istio
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 Slidecast
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 

Destaque

FSS Canada Launch Presentation
FSS Canada Launch PresentationFSS Canada Launch Presentation
FSS Canada Launch Presentationbpickers
 
Workshop socialnetworking hra
Workshop socialnetworking hraWorkshop socialnetworking hra
Workshop socialnetworking hraLe Thuy Hanh
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening MicrotravelLe Thuy Hanh
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosynedanphilpott
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisisJane Jordan-Meier
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10Dan Bolser
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on BlackberryChris Sparshott
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guideChris Sparshott
 
Chuong 6 nhung nen tang cua tang truong
Chuong 6   nhung nen tang cua tang truongChuong 6   nhung nen tang cua tang truong
Chuong 6 nhung nen tang cua tang truongLe Thuy Hanh
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26njhousehelper
 
Chuong 1 tu bat on vi mo den con duong tai co cau
Chuong 1   tu bat on vi mo den con duong tai co cauChuong 1   tu bat on vi mo den con duong tai co cau
Chuong 1 tu bat on vi mo den con duong tai co cauLe Thuy Hanh
 
Cicada Consulting
Cicada ConsultingCicada Consulting
Cicada Consultingpatrickdu
 
Chuong 7 doi moi tu duy va cai cach the che
Chuong 7   doi moi tu duy va cai cach the cheChuong 7   doi moi tu duy va cai cach the che
Chuong 7 doi moi tu duy va cai cach the cheLe Thuy Hanh
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global BrainDan Bolser
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategyGood Circle
 
IBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireIBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireChris Sparshott
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsLe Thuy Hanh
 

Destaque (20)

FSS Canada Launch Presentation
FSS Canada Launch PresentationFSS Canada Launch Presentation
FSS Canada Launch Presentation
 
Workshop socialnetworking hra
Workshop socialnetworking hraWorkshop socialnetworking hra
Workshop socialnetworking hra
 
gansu
gansugansu
gansu
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening Microtravel
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisis
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on Blackberry
 
Writing
WritingWriting
Writing
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
 
Chuong 6 nhung nen tang cua tang truong
Chuong 6   nhung nen tang cua tang truongChuong 6   nhung nen tang cua tang truong
Chuong 6 nhung nen tang cua tang truong
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26
 
Chuong 1 tu bat on vi mo den con duong tai co cau
Chuong 1   tu bat on vi mo den con duong tai co cauChuong 1   tu bat on vi mo den con duong tai co cau
Chuong 1 tu bat on vi mo den con duong tai co cau
 
Cicada Consulting
Cicada ConsultingCicada Consulting
Cicada Consulting
 
Chuong 7 doi moi tu duy va cai cach the che
Chuong 7   doi moi tu duy va cai cach the cheChuong 7   doi moi tu duy va cai cach the che
Chuong 7 doi moi tu duy va cai cach the che
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global Brain
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategy
 
IBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireIBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To Questionnaire
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbs
 
Presentation1
Presentation1Presentation1
Presentation1
 

Semelhante a IBM Sametime and Facetime

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionSaurabh Sharma
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Developing cross platform solutions
Developing cross platform solutionsDeveloping cross platform solutions
Developing cross platform solutionsSandeep Marathe
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 

Semelhante a IBM Sametime and Facetime (20)

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre Solution
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Developing cross platform solutions
Developing cross platform solutionsDeveloping cross platform solutions
Developing cross platform solutions
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 

Mais de Chris Sparshott

2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winnersChris Sparshott
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winnersChris Sparshott
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event videoChris Sparshott
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Chris Sparshott
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?Chris Sparshott
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewChris Sparshott
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reductionChris Sparshott
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoChris Sparshott
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSChris Sparshott
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and SubscriptionChris Sparshott
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBMChris Sparshott
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingChris Sparshott
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather informationChris Sparshott
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1Chris Sparshott
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureChris Sparshott
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireChris Sparshott
 

Mais de Chris Sparshott (20)

IBM and Apache Spark
IBM and Apache SparkIBM and Apache Spark
IBM and Apache Spark
 
2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winners
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winners
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event video
 
IBM Acquisitions
IBM AcquisitionsIBM Acquisitions
IBM Acquisitions
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overview
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reduction
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demo
 
Cloud Computing IaaS
Cloud Computing IaaSCloud Computing IaaS
Cloud Computing IaaS
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaS
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and Subscription
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensing
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather information
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile Picture
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A Questionnaire
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

IBM Sametime and Facetime

  • 1. Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2 ROI without Compromising Security, Management or Compliance
  • 2.
  • 3.
  • 4. So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 5. Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/ Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 6.
  • 7. Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
  • 8. FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare

Notas do Editor

  1. 09/08/09
  2. Headquartered in Foster City, CA Founded 1998; 1st IM partnership w/AOL -1999 500+ corporate customers; over 2M seats 8 of top 10 US Banks, 4 of top 5 Canadian Banks, 70% of largest Financial Services 154 employees: N. America, India, EMEA, APAC Privately funded: $30M total since 2001 24 month relationship with XBlock Systems, then acquired them in May 2005 Financials Privately held; industry analysts estimate $8m+ FaceTime provides security and compliance for Greynets – IM, P2P, adware/spyware 650 customers; over 2M seats under management 8 of top 10 YS Banks; 70% of largest Financial Services Horizontal: GE, Apple, Motorola, Medtronic, NCR, DISA FaceTime enables safe use and control of “Greynets” Security: Block worms, protect intellectual property, stop SpIM, scan for malware Compliance: Logging, auditing, archiving messages Management: Applying powerful and granular policies FaceTime has the strongest market position Largest deployed base of seats Largest employee base (150 employees w/ >90 in R&D) Largest security research team (FaceTime Security Labs)
  3. BEST PRACTICES DEPLOYMENT 1: Deploy FTEE to ensure compliance and security Guarantee compliance with TrueCompliance TM Stop worms and viruses and block SPIM Stop rogue IM & P2P and block circumvention at the perimeter 2: Monitor and analyze usage patterns Who is using what networks? What features are being used? File transfer, VoIP, app sharing, etc. How much and what P2P usage is going on? 3: Formulate usage policies By user, network and capabilities 4: Implement and enforce policies IMA for logging and audit workflow RTG to control non-compliant use
  4. 09/08/09
  5. 09/08/09
  6. 09/08/09
  7. 09/08/09
  8. 09/08/09