SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
© 2013 IBM Corporation
Unified Device Management
Keith Poyser
IBM Tivoli End Point and Mobility
UK
29th of May 2013 - Copenhagen
Martin Vittrup
IBM Tivoli End Point and Mobility
Denmark
1
Critical systems are globally distributed and in constant flux
Visibility is key in a constantly changing, distributed world
1
Find all assets on your
network – NOW!
Deploy a software
application worldwide in
days.
Patch hundreds of thousands
of workstations, laptops and
servers in minutes.
Continuously enforce security
configuration baselines, even on
mobile and off-network devices.Patch anywhere, anytime over any
network.
Find, Manage and Secure your
BYOD and Smart Devices
2
Endpoint complexity continues to increase
Endpoint
device counts,
devices and
platforms
Compliance
requirements
to establish,
prove and
maintain
continuous
compliance
Speed,
severity and
complexity of
malware
attacks
Patch O/S and application
vulnerabilities within hours
Rapid, agile, automated
remediation is needed
Mobile/roaming endpoints
New form factors and platforms
Employee-owned devices
Establish, prove and
maintain continuous
compliance
3
Why Unified Device Management?
 Management needs changes constantly
 Mobility of Laptops – Introduction of Mobile Devices
 Plethora of Operating systems with different Management
needs
 Threats constantly evolving
 Restrictions and regulations tightened
 More demand of Automation of tasks
 End User influence - Demands
 Investments around making IT part of business.
4
Why Unified Device Management?
 Many point solutions
 No total overview
 Differentiated management story
 Difficult to prove compliance
5
Unified Device Management with IBM
 One tool for every management aspect of Endpoints
 One overview of every Endpoint in the evironment
 One server for up to 250.000 Endpoints
 One way of thinking
 One easy to implement solution to save money
 And what is it then it can do?
6
Endpoint Spectrum
IBM’s Strategic Focus: Heterogeneous Endpoint Management
with Converged Security and Lifecycle Management
 Lifecycle and Security Management across multiple
end points – user roles with multiple devices
 Delivers common, policy based lifecycle endpoint
management across heterogeneous end point types
 Provides real time visibility and automates tasks
such as device configuration, software distribution,
enforce security settings, migration and retirement
 Endpoint lifecycle and security management is a
critical component of end to end service
management
MOBILE
ENDPOINT
DESKTOP / LAPTOP / SERVER
ENDPOINT
PURPOSE SPECIFIC ENDPOINT
Meters &
Measurement
Structures
Trains /
Rolling Stock ATM / POS
INTELLIGENT ASSETS
Security
Protecting
the enterprise
against internal
and external
threats
Audit
Compliance
Proving that you have
met regulation and
governance and are
meeting security
standards
Operations
The day to day activities
associated with aintaining
IT configurations
6
7
IBM Endpoint Manager
Endpoints
One Common Solution:
Overview of every Endpoint in your
environment – From the Data-
center to the Device
Unified management console:
Access to all functions – or limited
to the individual operators
responsibilities.
Common management agent:
Regardless of management
functions, only one Client Agent
required
Common infrastructure:
All functions share the
Infrastructure – and plugs in to
existing infrastructure
Single server:
One Management server can
support 250.000 Devices
Patch
Management
Lifecycle
Management
Software Use
Analysis
Power
Management
Mobile
Devices
Security and
Compliance
Core
Protection
Systems Management Security Management
Server
Automation
From the Data-Center to the Desktop to the Device
8
Overview of Patch Management
Start with the Patch
Management domain
The patches dashboard provides a
real-time view on Windows patches
requirement across your environment
See any New
Content here Application vendor patches
• Adobe Acrobat
• Adobe Reader
• Apple iTunes
• Apple QuickTime
• Adobe Flash Player
• Adobe Shockwave Player
• Mozilla Firefox
• RealPlayer
• Skype
• Oracle Java Runtime Environment
• WinAmp
• WinZip
…and operating
system patches
9
Power Consumption Summary
Total Power Consumption for all
devices is summarised on this
dashboard
Which includes your Total Current
Power Usage (kWh, Cost and Green
House)
Potential savings are also
identified
The breakdown of power usage for
workdays and weekends is now
available
10
Power Management: End-User Dashboard
This optional client dashboard can be
displayed on client workstations
Which shows the user their current
power footprint and how much energy
they can potentially save
11
Handle Multi-Platform Complexities With Ease
 Device management via Android agent,
iOS APIs, Lotus Traveler, Microsoft
Exchange, and Office 365
 Complete device hardware and software
inventory in near real-time
 Web reports provide at-a-glance mobile
device deployment overviews
 Pass mobile device data to network
management, service desk, asset
management, and security and compliance
systems
 Multi-tenancy support for service providers
and organizations that need to completely
separate different parts of the organization
Better plan internal mobile projects with easy
access to near-real time data about your mobile
environment.
12
12
IBM Endpoint Manager + Divide
Complete MDM BYOD Solution
Dual Persona
Leverages the sophisticated policies and
features of IBM MDM and Endpoint
Management
Management of Divide as a “virtual device”
including safe, secure distribution and
management of apps
+ +
Immediate solution for BYOD challenges
and security concerns for Mobility OS’s
Seamless delivery: same Divide App,
binding to IBM MDM at time of enrollment
Business AppsIBM Endpoint Manager
13
Customer Needs Key Features & Outcomes
IBM Office of the CIO then includes Mobile…
 Support BYOD for a variety of mobile
platforms securely for a highly mobile
population
 Scale to hundreds of thousands of
devices
 120,000 mobile devices, 80,000 personally
owned, supported in months
 Integrated Lotus Traveler, IBM
Connections, IBM Sametime, and IBM
Endpoint Manager
Extending Corporate Access
“IBM's BYOD program “really is about supporting employees in the
way they want to work. They will find the most appropriate tool to
get their job done. I want to make sure I can enable them to do
that, but in a way that safeguards the integrity of our business.”
Jeanette Horan, IBM CIO
14
Benefits of Unified Device Management
14
 “Organizations…would prefer to use the same tools across PCs, tablets and smartphones,
because it's increasingly the same people who support those device types”
– Gartner, PCCLM Magic Quadrant, January 2011
 Although at some level mobile is unique, the devices are just another form of endpoints in your
infrastructure. This means whichever technologies you procure should have a road map for
integration into your broader endpoint protection strategy.
– Forrester, Market Overview: Mobile Security, Q4, 2011
Reduces Hardware &
Administration Costs
• “Single pane” for mobile devices,
laptops, desktops, and servers
• Single Endpoint Manager Server
scales to 250,000+ devices
• Unified infrastructure/administration
model reduces FTE requirements
Fast Time-to-Value
• Enterprise-grade APIs enable
integration with service desks,
CMDBs, etc (Integrated Service
Management)
• Cloud-based content delivery model
allows for rapid updates with no
software upgrade or installation
required
15
Benefits
- One solution to handle all Endpoints in your environment – from the
Datacenter to the Desktop to the Device
- One Management Server to support 250.000 Endpoints saves you
investment in Hardware and Infrastructure
- One Inteligent Agent gives you real-time information about your
Endpoints
- One Unified Management Console reduces enablement and
administration costs
16
Questions?
17
17

Mais conteúdo relacionado

Mais procurados

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesSchneider Electric
 
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationSystem Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationScientia Groups
 
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVirtual Computer
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Peter Ocasek
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet Ericom Software
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnAndrew Miller
 
Enterprise mobility management a comprehensive guide
Enterprise mobility management a comprehensive guideEnterprise mobility management a comprehensive guide
Enterprise mobility management a comprehensive guideNestweaver
 
Pragma torino 20mar2014 vr02
Pragma torino 20mar2014 vr02Pragma torino 20mar2014 vr02
Pragma torino 20mar2014 vr02PRAGMA PROGETTI
 
Feb Webcast - Be Smart & Stay Lean
Feb Webcast - Be Smart & Stay LeanFeb Webcast - Be Smart & Stay Lean
Feb Webcast - Be Smart & Stay Leanjmustac
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
2015-04-02 Best in Class Cloud Based Accounting Systems
2015-04-02 Best in Class Cloud Based Accounting Systems2015-04-02 Best in Class Cloud Based Accounting Systems
2015-04-02 Best in Class Cloud Based Accounting SystemsRaffa Learning Community
 
Better Data Center Infrastructure Management
Better Data Center Infrastructure ManagementBetter Data Center Infrastructure Management
Better Data Center Infrastructure ManagementViridity Software
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Managementakeophila
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Thomas Godsted Rysgaard
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?ManageEngine
 

Mais procurados (20)

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
 
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationSystem Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT Automation
 
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and MobileVMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
VMworld 2008 - The Future of Virtual Desktops: Offline and Mobile
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Enterprise mobility management a comprehensive guide
Enterprise mobility management a comprehensive guideEnterprise mobility management a comprehensive guide
Enterprise mobility management a comprehensive guide
 
Pragma torino 20mar2014 vr02
Pragma torino 20mar2014 vr02Pragma torino 20mar2014 vr02
Pragma torino 20mar2014 vr02
 
Feb Webcast - Be Smart & Stay Lean
Feb Webcast - Be Smart & Stay LeanFeb Webcast - Be Smart & Stay Lean
Feb Webcast - Be Smart & Stay Lean
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
2015-04-02 Best in Class Cloud Based Accounting Systems
2015-04-02 Best in Class Cloud Based Accounting Systems2015-04-02 Best in Class Cloud Based Accounting Systems
2015-04-02 Best in Class Cloud Based Accounting Systems
 
Better Data Center Infrastructure Management
Better Data Center Infrastructure ManagementBetter Data Center Infrastructure Management
Better Data Center Infrastructure Management
 
Viewfinity Privilege Management
Viewfinity Privilege ManagementViewfinity Privilege Management
Viewfinity Privilege Management
 
VISIT2008 Managed Office
VISIT2008  Managed OfficeVISIT2008  Managed Office
VISIT2008 Managed Office
 
Thin client mechanism
Thin client mechanismThin client mechanism
Thin client mechanism
 
VMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial ServicesVMworld 2013: End User Computing Solutions for Financial Services
VMworld 2013: End User Computing Solutions for Financial Services
 
ITIL helpdesk
ITIL helpdeskITIL helpdesk
ITIL helpdesk
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 

Destaque

How to Minimize Your App’s Power Consumption
How to Minimize Your App’s Power Consumption How to Minimize Your App’s Power Consumption
How to Minimize Your App’s Power Consumption Qualcomm Developer Network
 
Energy consumption in smart phones
Energy consumption in smart phonesEnergy consumption in smart phones
Energy consumption in smart phonesNoor Huda
 
Energy consumption in smart phones huda
Energy consumption in smart phones hudaEnergy consumption in smart phones huda
Energy consumption in smart phones hudaNoor Huda
 
Energy efficiency of android
Energy efficiency of androidEnergy efficiency of android
Energy efficiency of androidlittleeye
 
Learn about energy consumption and battery life on Android devices
Learn about energy consumption and battery life on Android devicesLearn about energy consumption and battery life on Android devices
Learn about energy consumption and battery life on Android devicesMarakana Inc.
 
State of Mobile Commerce 2014 (Sucharita Mulpuru)
State of Mobile Commerce 2014 (Sucharita Mulpuru)State of Mobile Commerce 2014 (Sucharita Mulpuru)
State of Mobile Commerce 2014 (Sucharita Mulpuru)Monetate
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of SmartphonesPulkit Syal
 
50 Stunning Mobile Statistics
50 Stunning Mobile Statistics50 Stunning Mobile Statistics
50 Stunning Mobile StatisticsVala Afshar
 
Greenhouse Effect Power Point
Greenhouse Effect Power PointGreenhouse Effect Power Point
Greenhouse Effect Power Pointhilli1sm
 

Destaque (11)

How to Minimize Your App’s Power Consumption
How to Minimize Your App’s Power Consumption How to Minimize Your App’s Power Consumption
How to Minimize Your App’s Power Consumption
 
Energy consumption in smart phones
Energy consumption in smart phonesEnergy consumption in smart phones
Energy consumption in smart phones
 
Energy consumption in smart phones huda
Energy consumption in smart phones hudaEnergy consumption in smart phones huda
Energy consumption in smart phones huda
 
Energy efficiency of android
Energy efficiency of androidEnergy efficiency of android
Energy efficiency of android
 
Learn about energy consumption and battery life on Android devices
Learn about energy consumption and battery life on Android devicesLearn about energy consumption and battery life on Android devices
Learn about energy consumption and battery life on Android devices
 
State of Mobile Commerce 2014 (Sucharita Mulpuru)
State of Mobile Commerce 2014 (Sucharita Mulpuru)State of Mobile Commerce 2014 (Sucharita Mulpuru)
State of Mobile Commerce 2014 (Sucharita Mulpuru)
 
The Greenhouse Effect
The Greenhouse EffectThe Greenhouse Effect
The Greenhouse Effect
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of Smartphones
 
greenhouse effect
 greenhouse effect greenhouse effect
greenhouse effect
 
50 Stunning Mobile Statistics
50 Stunning Mobile Statistics50 Stunning Mobile Statistics
50 Stunning Mobile Statistics
 
Greenhouse Effect Power Point
Greenhouse Effect Power PointGreenhouse Effect Power Point
Greenhouse Effect Power Point
 

Semelhante a Unified Device Management: Visibility and Control Across All Endpoints

IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceHCLSoftware
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieCor Ranzijn
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...RapidValue
 
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and AndroidBigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and AndroidHCLSoftware
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Jae Hak Lee
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 

Semelhante a Unified Device Management: Visibility and Control Across All Endpoints (20)

IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix WorkspaceSolve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
Solve Employee Experience, Security, and Silo Problems with HCL BigFix Workspace
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategie
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
Point-to-Point vs. MEAP - The Right Approach for an Integrated Mobility Solut...
 
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and AndroidBigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
BigFix Mobile: Expanding Modern Endpoint Management to iOS and Android
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025Team C2 Brochure Eng V1025
Team C2 Brochure Eng V1025
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 

Mais de IBM Danmark

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyIBM Danmark
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjIBM Danmark
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenIBM Danmark
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip NyborgIBM Danmark
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim EscherichIBM Danmark
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenIBM Danmark
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonIBM Danmark
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice BayerIBM Danmark
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBMIBM Danmark
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC UpdateIBM Danmark
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introductionIBM Danmark
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminarIBM Danmark
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenIBM Danmark
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyIBM Danmark
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnIBM Danmark
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenIBM Danmark
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexIBM Danmark
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichIBM Danmark
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenIBM Danmark
 

Mais de IBM Danmark (20)

DevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinleyDevOps, Development and Operations, Tina McGinley
DevOps, Development and Operations, Tina McGinley
 
Velkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia RønhøjVelkomst, Universitetssporet 2013, Pia Rønhøj
Velkomst, Universitetssporet 2013, Pia Rønhøj
 
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-AndersenSmarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
Smarter Commerce, Salg og Marketing, Thomas Steglich-Andersen
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
IT innovation, Kim Escherich
IT innovation, Kim EscherichIT innovation, Kim Escherich
IT innovation, Kim Escherich
 
Echo.IT, Stefan K. Madsen
Echo.IT, Stefan K. MadsenEcho.IT, Stefan K. Madsen
Echo.IT, Stefan K. Madsen
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Social Business, Alice Bayer
Social Business, Alice BayerSocial Business, Alice Bayer
Social Business, Alice Bayer
 
Numascale Product IBM
Numascale Product IBMNumascale Product IBM
Numascale Product IBM
 
Mellanox IBM
Mellanox IBMMellanox IBM
Mellanox IBM
 
Intel HPC Update
Intel HPC UpdateIntel HPC Update
Intel HPC Update
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
NeXtScale HPC seminar
NeXtScale HPC seminarNeXtScale HPC seminar
NeXtScale HPC seminar
 
Future of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian NielsenFuture of Power: PowerLinux - Jan Kristian Nielsen
Future of Power: PowerLinux - Jan Kristian Nielsen
 
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve SibleyFuture of Power: Power Strategy and Offerings for Denmark - Steve Sibley
Future of Power: Power Strategy and Offerings for Denmark - Steve Sibley
 
Future of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren RavnFuture of Power: Big Data - Søren Ravn
Future of Power: Big Data - Søren Ravn
 
Future of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim MortensenFuture of Power: IBM PureFlex - Kim Mortensen
Future of Power: IBM PureFlex - Kim Mortensen
 
Future of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik RexFuture of Power: IBM Trends & Directions - Erik Rex
Future of Power: IBM Trends & Directions - Erik Rex
 
Future of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim EscherichFuture of Power: Håndtering af nye teknologier - Kim Escherich
Future of Power: Håndtering af nye teknologier - Kim Escherich
 
Future of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-JensenFuture of Power - Lars Mikkelgaard-Jensen
Future of Power - Lars Mikkelgaard-Jensen
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Unified Device Management: Visibility and Control Across All Endpoints

  • 1. © 2013 IBM Corporation Unified Device Management Keith Poyser IBM Tivoli End Point and Mobility UK 29th of May 2013 - Copenhagen Martin Vittrup IBM Tivoli End Point and Mobility Denmark
  • 2. 1 Critical systems are globally distributed and in constant flux Visibility is key in a constantly changing, distributed world 1 Find all assets on your network – NOW! Deploy a software application worldwide in days. Patch hundreds of thousands of workstations, laptops and servers in minutes. Continuously enforce security configuration baselines, even on mobile and off-network devices.Patch anywhere, anytime over any network. Find, Manage and Secure your BYOD and Smart Devices
  • 3. 2 Endpoint complexity continues to increase Endpoint device counts, devices and platforms Compliance requirements to establish, prove and maintain continuous compliance Speed, severity and complexity of malware attacks Patch O/S and application vulnerabilities within hours Rapid, agile, automated remediation is needed Mobile/roaming endpoints New form factors and platforms Employee-owned devices Establish, prove and maintain continuous compliance
  • 4. 3 Why Unified Device Management?  Management needs changes constantly  Mobility of Laptops – Introduction of Mobile Devices  Plethora of Operating systems with different Management needs  Threats constantly evolving  Restrictions and regulations tightened  More demand of Automation of tasks  End User influence - Demands  Investments around making IT part of business.
  • 5. 4 Why Unified Device Management?  Many point solutions  No total overview  Differentiated management story  Difficult to prove compliance
  • 6. 5 Unified Device Management with IBM  One tool for every management aspect of Endpoints  One overview of every Endpoint in the evironment  One server for up to 250.000 Endpoints  One way of thinking  One easy to implement solution to save money  And what is it then it can do?
  • 7. 6 Endpoint Spectrum IBM’s Strategic Focus: Heterogeneous Endpoint Management with Converged Security and Lifecycle Management  Lifecycle and Security Management across multiple end points – user roles with multiple devices  Delivers common, policy based lifecycle endpoint management across heterogeneous end point types  Provides real time visibility and automates tasks such as device configuration, software distribution, enforce security settings, migration and retirement  Endpoint lifecycle and security management is a critical component of end to end service management MOBILE ENDPOINT DESKTOP / LAPTOP / SERVER ENDPOINT PURPOSE SPECIFIC ENDPOINT Meters & Measurement Structures Trains / Rolling Stock ATM / POS INTELLIGENT ASSETS Security Protecting the enterprise against internal and external threats Audit Compliance Proving that you have met regulation and governance and are meeting security standards Operations The day to day activities associated with aintaining IT configurations 6
  • 8. 7 IBM Endpoint Manager Endpoints One Common Solution: Overview of every Endpoint in your environment – From the Data- center to the Device Unified management console: Access to all functions – or limited to the individual operators responsibilities. Common management agent: Regardless of management functions, only one Client Agent required Common infrastructure: All functions share the Infrastructure – and plugs in to existing infrastructure Single server: One Management server can support 250.000 Devices Patch Management Lifecycle Management Software Use Analysis Power Management Mobile Devices Security and Compliance Core Protection Systems Management Security Management Server Automation From the Data-Center to the Desktop to the Device
  • 9. 8 Overview of Patch Management Start with the Patch Management domain The patches dashboard provides a real-time view on Windows patches requirement across your environment See any New Content here Application vendor patches • Adobe Acrobat • Adobe Reader • Apple iTunes • Apple QuickTime • Adobe Flash Player • Adobe Shockwave Player • Mozilla Firefox • RealPlayer • Skype • Oracle Java Runtime Environment • WinAmp • WinZip …and operating system patches
  • 10. 9 Power Consumption Summary Total Power Consumption for all devices is summarised on this dashboard Which includes your Total Current Power Usage (kWh, Cost and Green House) Potential savings are also identified The breakdown of power usage for workdays and weekends is now available
  • 11. 10 Power Management: End-User Dashboard This optional client dashboard can be displayed on client workstations Which shows the user their current power footprint and how much energy they can potentially save
  • 12. 11 Handle Multi-Platform Complexities With Ease  Device management via Android agent, iOS APIs, Lotus Traveler, Microsoft Exchange, and Office 365  Complete device hardware and software inventory in near real-time  Web reports provide at-a-glance mobile device deployment overviews  Pass mobile device data to network management, service desk, asset management, and security and compliance systems  Multi-tenancy support for service providers and organizations that need to completely separate different parts of the organization Better plan internal mobile projects with easy access to near-real time data about your mobile environment.
  • 13. 12 12 IBM Endpoint Manager + Divide Complete MDM BYOD Solution Dual Persona Leverages the sophisticated policies and features of IBM MDM and Endpoint Management Management of Divide as a “virtual device” including safe, secure distribution and management of apps + + Immediate solution for BYOD challenges and security concerns for Mobility OS’s Seamless delivery: same Divide App, binding to IBM MDM at time of enrollment Business AppsIBM Endpoint Manager
  • 14. 13 Customer Needs Key Features & Outcomes IBM Office of the CIO then includes Mobile…  Support BYOD for a variety of mobile platforms securely for a highly mobile population  Scale to hundreds of thousands of devices  120,000 mobile devices, 80,000 personally owned, supported in months  Integrated Lotus Traveler, IBM Connections, IBM Sametime, and IBM Endpoint Manager Extending Corporate Access “IBM's BYOD program “really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business.” Jeanette Horan, IBM CIO
  • 15. 14 Benefits of Unified Device Management 14  “Organizations…would prefer to use the same tools across PCs, tablets and smartphones, because it's increasingly the same people who support those device types” – Gartner, PCCLM Magic Quadrant, January 2011  Although at some level mobile is unique, the devices are just another form of endpoints in your infrastructure. This means whichever technologies you procure should have a road map for integration into your broader endpoint protection strategy. – Forrester, Market Overview: Mobile Security, Q4, 2011 Reduces Hardware & Administration Costs • “Single pane” for mobile devices, laptops, desktops, and servers • Single Endpoint Manager Server scales to 250,000+ devices • Unified infrastructure/administration model reduces FTE requirements Fast Time-to-Value • Enterprise-grade APIs enable integration with service desks, CMDBs, etc (Integrated Service Management) • Cloud-based content delivery model allows for rapid updates with no software upgrade or installation required
  • 16. 15 Benefits - One solution to handle all Endpoints in your environment – from the Datacenter to the Desktop to the Device - One Management Server to support 250.000 Endpoints saves you investment in Hardware and Infrastructure - One Inteligent Agent gives you real-time information about your Endpoints - One Unified Management Console reduces enablement and administration costs
  • 18. 17 17