SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
BlackBerry
2010-
Feature phone
1999-
MDM
2013-
EMM
2016-
UMM
2016+
Cognitive UMM
2017+
Actionable Insights
April 2017
Tim Youm
unifiedmobility@au1.ibm.com
+61 416 176 573
2
From MDM, through EMM, to Cognitive UMM
MDM
Mobile Device
Management
MDM
EMM
Enterprise Mobility
Management
MDM
MAM
MCM
UMM
Unified Mobility
Management
MDM
MAM
MCM
MTP
MEM
MIM
UEM
AI
Mobile Device Management
Mobile Application Management
Mobile Content Management
Mobile Threat Prevention
Mobile Expense Management
Unified Endpoint Management
Manage Laptops & Desktops & IoT: Windows 10 (+Windows 7 & XP via agent) , iOS, MacOS &
Android from single pane of glass. No SCCM SOE required
Actionable Insights
Contextual Analytics ( Powered by IBM Watson )
Mobile Identity Management
(IDaaS)
Are you drowning in mobile minutiae?
Today’s mobile landscape looks very different than it did just a few years
ago. In fact, with 7.9million mobile applications downloaded every month1
and 387 new malware threats identified every minute,2 the landscape can
change overnight. In an ever-evolving mobile world, organisations are
actively struggling to maintain security while keeping their workers
productive each day. Leveraging mobile data to add business value also
can be a tall order.
While working to maintain tactical control of the mobile environment, IT
managers often find themselves drowning inminutiae.
Overwhelmed by the number of moving parts, they’re unable to stay
abreast of the latest threats, let alone extract meaning from or
make decisions based on the mountains of data now being collected.
With limited IT resources dedicated to mobile technology tools that
facilitate reactive rather than proactive management—and limited
visibility into mobile intelligence across the organisation—many
managers have had to choose between security and productivity as the
focus of theirefforts.
Given the importance of mobile computing in keeping businesses
competitive, it’s more important than ever that organisations strike the
appropriate balance between security and productivity—and tap into
the vast potential business value that mobility represents. With proactive
delivery of rich insights, organisations can transition from a purely tactical
management approach to one that is strategic; informed by industry
data and best practices, optimised for IT efficiency, and appropriate to
the organisation and each user. This new paradigm is the difference
between a legacy mobile device management (MDM) solution and a
new, smarter approach with Cognitive Unified Mobility Management
(UMM).
472: Average number
of applications managed by
heavily mobile
organisations.3
See the latest statistics on mobile security in this IBM infographic.
1 Jeremy Sacco, “App downloads soar in October,” The Fiksu Blog, November 24, 2015.
2 “McAfee Labs Threat Report,” McAfee Labs, February 2015.
3 “The Massive Mobile Migration,” IBM, April 27, 2016.
MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
3
WHY MaaS360?
Insights and analytics from MaaS360 with Watson
Thanks to a massive migration to mobile platforms, what began as
mobile device management (MDM) evolved over time into enterprise
mobility management (EMM) technology, encompassing MDM and the
capabilities needed to manage and secure applications, content, bring-
your-own-device (BYOD) environments and much more.
The next step in the evolution accounts for all device varieties—
smartphones, tablets, laptops, desktops, wearables, and devices
designed for the Internet of Things (IoT)—hence the term unified
endpoint management (UEM). IBM® MaaS360® has unleashed a
unique approach to UEM that does more than manage and secure
endpoints, users, groups, and their applications, content and data.
MaaS360 goes not just a step, but a leap, to leverage the deep insights
that big-data analytics and cognitive computing can provide for a given
organisation’s IT environment—or even for an entire industry.
Keeping with IBM leadership in ushering in the new cognitive era,
MaaS360 is now available with deep insights and cloud-based
analytics. With IBM Watson® technology, backed by the industry-
leading security intelligence of IBM X-Force® Exchange, MaaS360
insights and analytics can help organisations accelerate and maximise
the return on investment (ROI) from their mobile strategies by:
• Identifying and leveraging digital transformationopportunities
• Reducing security risks
• Increasing the productivity of theirworkforce
• Boosting the efficiency of IToperations
• Helping the business make more informed decisions,including
spending decisions
MaaS360 with Watson includes threekey capabilities:
• Advisor, which provides actionable intelligence thatis tailored to the
organisation
• Mobile Security Index, which provides the industry’s first publicly
available mobile security scorecard
• Mobile Metrics, which provides the industry’s first cloud-sourced
mobile benchmarking data
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION
Click image to enlarge. Click again for original size.
MaaS360 with Watson
ushers in a new era of
enterprise mobility with
cognitive unified endpoint
management.
4
WHY MaaS360?
MAAS360 ADVISOR:
Actionable insights, tailored to your environment
With Watson, MaaS360 Advisor is a powerful cognitive engine that
provides contextual information based on industry best practices as
well as relevant alerts on emerging threats. This actionable intelligence
is sourced from both structured and unstructured data,
and is customised based on your organisation’s industry, its size and its
mobile environment, including the type of devices, platforms and
applications used across theorganisation.
MaaS360 Advisor provides insights and recommendations that
empower youto:
• Discover best practices for user productivity, recommendations for
IT optimisation and potential security threats—delivered right to your
MaaS360dashboard
• Define what the insight is and why it is important for your
organisation
• Assess the impact of best practices or security risks to your
devices, users, applications andmore
• Act on the intelligence to unlock business opportunities or
remediate security threats
Examples of insights you can expect from MaaS360 Advisor include:
• Information on upcoming operating system (OS) releases for
Apple iOS, Google Android, Microsoft Windows and products
from other original equipmentmanufacturers
• Best practices for security rules and policies
• Recommendations based on IT optimisationmodels
• Policy changes and other remediation steps you can take based on
recent vulnerabilities and detailed riskexposure information
• Visibility into specific at-riskdevices
• Information on relevant security programs such as Samsung Knox,
Apple VPP/DEP, Android andothers
• Mobile application recommendations based on applicationuse
and sentiment analysis of the current application catalog
• Other recommendations based on insights gathered from peers in
your industry
MaaS360 Advisor leverages feedback mechanisms, learning models
and automation to enhance productivity, increase IT efficiency and
reduce risk exposure over time. It also provides recommendations to
facilitate end-user notification and education, maximising the value of the
insights to theorganisation.
With Watson, MaaS360
Advisor deliversaugmented
intelligence and actionable
insights.
Click image to enlarge. Click again for original size.
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION
5
WHY MaaS360?
MOBILE SECURITY INDEX:
Where do youstand?
The MaaS360 Mobile Security Index is the industry’s first publicly
available mobile security scorecard. And because it is available at no
cost to customers and non-customers alike, it will offer the first view
organisations have into MaaS360 insights andanalytics.
This scoring index, which takes industry and geography into account, is
designed to provide administrators with a mobile security rating for their
organisation based on current industry configuration data and best
practices. It then provides a benchmark as a point of comparison against
other similar organisations based on criteria such as industry, region or
size. These comparisons are based on massive amounts of data from
existing MaaS360implementations.
The Mobile Security Index also provides specific recommendations
and best practices for improving the organisation’s overall security
posture. The end goal is to foster mobile security best practices
across companies and industriesworldwide.
In addition to an overall score, the Mobile Security Index provides
scores across fourcategories:
• Secure connectivity
• Device security
• Application security
• Data security
To generate a score from the Mobile Security Index, organisations
need only to complete a brief online self-assessment—providing
answers to a series of questions about their mobile security
implementation. Those completing the assessment are queried on
their organisation’s approach to mobile devices, platforms,
applications and policies.
Click image to enlarge. Click again for original size.
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION
MaaS360 Mobile Security
Index is the first step to
assess and improve your
organisation’s approach to
mobile security.
6
WHY MaaS360?
MOBILE METRICS:
Benchmarking data and best practices
MaaS360 Mobile Metrics leverages the aggregated data of more than
12,000 MaaS360 customer implementations worldwide to provide the
industry’s first cloud-sourced mobile benchmarking data. This data,
which reflects a wide range of organisation types and their mobile
implementations, allows customers to compare their security
configurations and usage data with peers across similar industries, sizes
and other criteria.
Mobile Metrics provides a clearer view into mobile environments,
enables more informed decision-making and gives organisations a
larger context for evaluating their security policies. For example,
customers can compare their password requirements with those of
other organisations in their industry, the number of applications
they’ve blacklisted, or the number of devices on a given platform.
With forecasts and predictive models, Mobile Metrics can also help
companies predict adoption rates of new mobile applications based on
the experiences of similar organisations, or identify other potential
opportunities to improve userproductivity.
Mobile Metrics allows you to compare your environment against
benchmarks on health, compliance and security, including:
• Deployment
• Devices
• Applications
• Security
MaaS360 MobileMetrics
enables benchmarking
across industries and
company sizes.
Click image to enlarge. Click again for original size.
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION
7
WHY MaaS360?
Why MaaS360 Cognitive UMM?
MaaS360 with Watson delivers an industry-first set of productivity
and security solutions for cognitive unified endpoint management,
made possible through technologies and intelligence available
exclusively from IBM. With Watson, MaaS360 actionable insights is
informed by the aggregated cloud-sourced data of more than
12,000 MaaS360 implementations and backed by the IBM X-Force
Exchange security community.
And this is just the beginning. As cognitive capabilities are added,
MaaS360 with Watson builds greater knowledge and context, for a
smarter approach to securing and enabling endpoints, end users and
everything in between. These capabilities create a valuable, trusted
advisor and partner in the digital transformation of business.
IBM MaaS360 cognitive unified mobility management combines
device application and content management with strong security
through one platform, allowing customers to enhance user
productivity and maximise security withoutcompromising the user
experience. IBM feeds data aggregated from implementations
worldwide back into MaaS360 to continue the cycle of providing
contextual and meaningfulintelligence.
IBM Watson is a cognitive technology that can analyse and interpret all
types of data, including unstructured text, images, audio and video. It
utilises machine learning to grow its subject matter expertise in
applications and systems. The natural language and data mining
capabilities provided by Watson have been used to address a wide
range of difficult problems, from cancer diagnosis and treatment
decisions to weather forecasting. Watson has now partnered with
MaaS360 to enlighten unified endpoint management for business
transformation.
IBM X-Force Exchange is a cloud-based threat intelligence sharing
platform that facilitates research on security threats, the aggregation
of security intelligence, and collaboration with peers. X-Force
Exchange combines content from IBM, open-source projects and
other third parties to provide relevant and detailed information about
vulnerabilities, IP addresses, domains and web applications in real
time. It is supported by IBM X-Force, one of the most recognised
security research teams in theworld.
IBM X-Force Exchange
IBM MaaS360
MOBILE MINUTIAE? COGNITIVE INSIGHTS WHY MaaS360? MORE INFORMATION
Learn more on the web about IBM Watson and IBM X-Force Exchange.
8
ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
"There is enormous potential in unified endpoint management when you
incorporate cognitive technology like Watson into MaaS360 (UMM). ”
"With this capability, we are able to get an in-depth feel of our device
landscape instantly helping us make decisions faster as to where we
need to evolve the platform."
Brian Jacome, Senior Product Manager, Enterprise Mobility, RBC Royal
Bank
9
“With IBM (MaaS360 UMM), we gained a reliable and
affordable cloud-based solution to help us protect mobile devices
and empower our field staff.”
Rich Mullens, Operations Manager, The Fundraising People, Australia
10
Within four weeks, Patties moved from AirWatch (EMM) to MaaS360 (UMM)
which enabled to decommission three servers and save in maintenance costs.
“Headache gone.” "We've now got total visibility of where our devices are
around the country, ensuring we can remote wipe corporate data from individual
devices without damaging personal information.”
Zelko Erdec, IT General Manager, Patties Foods Australia
11
In addition to productivity gains, cost savings are considerable due to a
reduced administration overhead, especially for devices that are stolen or
have malware on them, since we can handle everything remotely.”
“AirWatch (EMM) and Maas360 (UMM) were reasonable comparable in cost
but in our view MaaS360 was easier to deploy and it also had
antivirus functionality built-in.”
Wayne Broekhals, IT Manager, Arrow International New Zealand
12
“IBM Maas360 (UMM) is truly the complete package. It provides us
with everything we need; it’s easier to manage and less expensive than
our former IT solution.”
Lisa Berta, Senior Desktop Services Officer, City of Greater Dandenong, Victoria,
Australia
13
"When it comes to purchasing iPADs and a Unified Mobility Management
platform for the next two years, we found IBM to be very competitive, We
are very confident that this partnership will strongly support our
education goals and future aspirations"
Damian Messer, Principal, St Virgil's College, Australia
14
BlackBerry
2010-
Feature phone
1999-
MDM
2013-
EMM
2016-
UMM
2016+
Cognitive UMM
2017+
Start a free trial at
https://trials.maas360.com
Cognitive UMM for the price of MDM

Mais conteúdo relacionado

Mais procurados

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat ManagementKillian Delaney
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessIBM Security
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 

Mais procurados (20)

IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Mobile Threat Management
Mobile Threat ManagementMobile Threat Management
Mobile Threat Management
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Infographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud SuccessInfographic: 5 Tips for Cloud Success
Infographic: 5 Tips for Cloud Success
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 

Semelhante a Actionable insights

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...bupbechanhgmail
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseAhmed Banafa
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011fivehmg_m
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementSoftweb Solutions
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...Enterprise Mobile
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS America
 

Semelhante a Actionable insights (20)

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...Securely adopting mobile technology innovations for your enterprise using ibm...
Securely adopting mobile technology innovations for your enterprise using ibm...
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
WSO2ConAsia2016-Prabath
WSO2ConAsia2016-PrabathWSO2ConAsia2016-Prabath
WSO2ConAsia2016-Prabath
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Challenges ,trends , and future of enterprise
Challenges ,trends , and future of enterpriseChallenges ,trends , and future of enterprise
Challenges ,trends , and future of enterprise
 
SIEM Buyer's Guide
SIEM Buyer's GuideSIEM Buyer's Guide
SIEM Buyer's Guide
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011
 
Chris Reed Sigma PDF
Chris Reed Sigma PDFChris Reed Sigma PDF
Chris Reed Sigma PDF
 
Mobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise managementMobile application management (mam) in enterprise management
Mobile application management (mam) in enterprise management
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
From Device Selection to Data Protection: Selecting the Right Mobility Soluti...
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 

Mais de Tim Youm

11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
Unified Cloud with Watson Overview
Unified Cloud with Watson OverviewUnified Cloud with Watson Overview
Unified Cloud with Watson OverviewTim Youm
 
Unified Mobility in Schools
Unified Mobility in SchoolsUnified Mobility in Schools
Unified Mobility in SchoolsTim Youm
 
Unified Mobility in the Industrial Sector
Unified Mobility in the Industrial SectorUnified Mobility in the Industrial Sector
Unified Mobility in the Industrial SectorTim Youm
 
Unified Mobility in Healthcare
Unified Mobility in HealthcareUnified Mobility in Healthcare
Unified Mobility in HealthcareTim Youm
 
2017 Mobility industry trends
2017 Mobility industry trends2017 Mobility industry trends
2017 Mobility industry trendsTim Youm
 

Mais de Tim Youm (6)

11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Unified Cloud with Watson Overview
Unified Cloud with Watson OverviewUnified Cloud with Watson Overview
Unified Cloud with Watson Overview
 
Unified Mobility in Schools
Unified Mobility in SchoolsUnified Mobility in Schools
Unified Mobility in Schools
 
Unified Mobility in the Industrial Sector
Unified Mobility in the Industrial SectorUnified Mobility in the Industrial Sector
Unified Mobility in the Industrial Sector
 
Unified Mobility in Healthcare
Unified Mobility in HealthcareUnified Mobility in Healthcare
Unified Mobility in Healthcare
 
2017 Mobility industry trends
2017 Mobility industry trends2017 Mobility industry trends
2017 Mobility industry trends
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Actionable insights

  • 1. BlackBerry 2010- Feature phone 1999- MDM 2013- EMM 2016- UMM 2016+ Cognitive UMM 2017+ Actionable Insights April 2017 Tim Youm unifiedmobility@au1.ibm.com +61 416 176 573
  • 2. 2 From MDM, through EMM, to Cognitive UMM MDM Mobile Device Management MDM EMM Enterprise Mobility Management MDM MAM MCM UMM Unified Mobility Management MDM MAM MCM MTP MEM MIM UEM AI Mobile Device Management Mobile Application Management Mobile Content Management Mobile Threat Prevention Mobile Expense Management Unified Endpoint Management Manage Laptops & Desktops & IoT: Windows 10 (+Windows 7 & XP via agent) , iOS, MacOS & Android from single pane of glass. No SCCM SOE required Actionable Insights Contextual Analytics ( Powered by IBM Watson ) Mobile Identity Management (IDaaS)
  • 3. Are you drowning in mobile minutiae? Today’s mobile landscape looks very different than it did just a few years ago. In fact, with 7.9million mobile applications downloaded every month1 and 387 new malware threats identified every minute,2 the landscape can change overnight. In an ever-evolving mobile world, organisations are actively struggling to maintain security while keeping their workers productive each day. Leveraging mobile data to add business value also can be a tall order. While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning inminutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organisation—many managers have had to choose between security and productivity as the focus of theirefforts. Given the importance of mobile computing in keeping businesses competitive, it’s more important than ever that organisations strike the appropriate balance between security and productivity—and tap into the vast potential business value that mobility represents. With proactive delivery of rich insights, organisations can transition from a purely tactical management approach to one that is strategic; informed by industry data and best practices, optimised for IT efficiency, and appropriate to the organisation and each user. This new paradigm is the difference between a legacy mobile device management (MDM) solution and a new, smarter approach with Cognitive Unified Mobility Management (UMM). 472: Average number of applications managed by heavily mobile organisations.3 See the latest statistics on mobile security in this IBM infographic. 1 Jeremy Sacco, “App downloads soar in October,” The Fiksu Blog, November 24, 2015. 2 “McAfee Labs Threat Report,” McAfee Labs, February 2015. 3 “The Massive Mobile Migration,” IBM, April 27, 2016. MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION ADVISOR MOBILE SECURITYINDEX MOBILE METRICS 3 WHY MaaS360?
  • 4. Insights and analytics from MaaS360 with Watson Thanks to a massive migration to mobile platforms, what began as mobile device management (MDM) evolved over time into enterprise mobility management (EMM) technology, encompassing MDM and the capabilities needed to manage and secure applications, content, bring- your-own-device (BYOD) environments and much more. The next step in the evolution accounts for all device varieties— smartphones, tablets, laptops, desktops, wearables, and devices designed for the Internet of Things (IoT)—hence the term unified endpoint management (UEM). IBM® MaaS360® has unleashed a unique approach to UEM that does more than manage and secure endpoints, users, groups, and their applications, content and data. MaaS360 goes not just a step, but a leap, to leverage the deep insights that big-data analytics and cognitive computing can provide for a given organisation’s IT environment—or even for an entire industry. Keeping with IBM leadership in ushering in the new cognitive era, MaaS360 is now available with deep insights and cloud-based analytics. With IBM Watson® technology, backed by the industry- leading security intelligence of IBM X-Force® Exchange, MaaS360 insights and analytics can help organisations accelerate and maximise the return on investment (ROI) from their mobile strategies by: • Identifying and leveraging digital transformationopportunities • Reducing security risks • Increasing the productivity of theirworkforce • Boosting the efficiency of IToperations • Helping the business make more informed decisions,including spending decisions MaaS360 with Watson includes threekey capabilities: • Advisor, which provides actionable intelligence thatis tailored to the organisation • Mobile Security Index, which provides the industry’s first publicly available mobile security scorecard • Mobile Metrics, which provides the industry’s first cloud-sourced mobile benchmarking data ADVISOR MOBILE SECURITYINDEX MOBILE METRICS MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION Click image to enlarge. Click again for original size. MaaS360 with Watson ushers in a new era of enterprise mobility with cognitive unified endpoint management. 4 WHY MaaS360?
  • 5. MAAS360 ADVISOR: Actionable insights, tailored to your environment With Watson, MaaS360 Advisor is a powerful cognitive engine that provides contextual information based on industry best practices as well as relevant alerts on emerging threats. This actionable intelligence is sourced from both structured and unstructured data, and is customised based on your organisation’s industry, its size and its mobile environment, including the type of devices, platforms and applications used across theorganisation. MaaS360 Advisor provides insights and recommendations that empower youto: • Discover best practices for user productivity, recommendations for IT optimisation and potential security threats—delivered right to your MaaS360dashboard • Define what the insight is and why it is important for your organisation • Assess the impact of best practices or security risks to your devices, users, applications andmore • Act on the intelligence to unlock business opportunities or remediate security threats Examples of insights you can expect from MaaS360 Advisor include: • Information on upcoming operating system (OS) releases for Apple iOS, Google Android, Microsoft Windows and products from other original equipmentmanufacturers • Best practices for security rules and policies • Recommendations based on IT optimisationmodels • Policy changes and other remediation steps you can take based on recent vulnerabilities and detailed riskexposure information • Visibility into specific at-riskdevices • Information on relevant security programs such as Samsung Knox, Apple VPP/DEP, Android andothers • Mobile application recommendations based on applicationuse and sentiment analysis of the current application catalog • Other recommendations based on insights gathered from peers in your industry MaaS360 Advisor leverages feedback mechanisms, learning models and automation to enhance productivity, increase IT efficiency and reduce risk exposure over time. It also provides recommendations to facilitate end-user notification and education, maximising the value of the insights to theorganisation. With Watson, MaaS360 Advisor deliversaugmented intelligence and actionable insights. Click image to enlarge. Click again for original size. ADVISOR MOBILE SECURITYINDEX MOBILE METRICS MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION 5 WHY MaaS360?
  • 6. MOBILE SECURITY INDEX: Where do youstand? The MaaS360 Mobile Security Index is the industry’s first publicly available mobile security scorecard. And because it is available at no cost to customers and non-customers alike, it will offer the first view organisations have into MaaS360 insights andanalytics. This scoring index, which takes industry and geography into account, is designed to provide administrators with a mobile security rating for their organisation based on current industry configuration data and best practices. It then provides a benchmark as a point of comparison against other similar organisations based on criteria such as industry, region or size. These comparisons are based on massive amounts of data from existing MaaS360implementations. The Mobile Security Index also provides specific recommendations and best practices for improving the organisation’s overall security posture. The end goal is to foster mobile security best practices across companies and industriesworldwide. In addition to an overall score, the Mobile Security Index provides scores across fourcategories: • Secure connectivity • Device security • Application security • Data security To generate a score from the Mobile Security Index, organisations need only to complete a brief online self-assessment—providing answers to a series of questions about their mobile security implementation. Those completing the assessment are queried on their organisation’s approach to mobile devices, platforms, applications and policies. Click image to enlarge. Click again for original size. ADVISOR MOBILE SECURITYINDEX MOBILE METRICS MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION MaaS360 Mobile Security Index is the first step to assess and improve your organisation’s approach to mobile security. 6 WHY MaaS360?
  • 7. MOBILE METRICS: Benchmarking data and best practices MaaS360 Mobile Metrics leverages the aggregated data of more than 12,000 MaaS360 customer implementations worldwide to provide the industry’s first cloud-sourced mobile benchmarking data. This data, which reflects a wide range of organisation types and their mobile implementations, allows customers to compare their security configurations and usage data with peers across similar industries, sizes and other criteria. Mobile Metrics provides a clearer view into mobile environments, enables more informed decision-making and gives organisations a larger context for evaluating their security policies. For example, customers can compare their password requirements with those of other organisations in their industry, the number of applications they’ve blacklisted, or the number of devices on a given platform. With forecasts and predictive models, Mobile Metrics can also help companies predict adoption rates of new mobile applications based on the experiences of similar organisations, or identify other potential opportunities to improve userproductivity. Mobile Metrics allows you to compare your environment against benchmarks on health, compliance and security, including: • Deployment • Devices • Applications • Security MaaS360 MobileMetrics enables benchmarking across industries and company sizes. Click image to enlarge. Click again for original size. ADVISOR MOBILE SECURITYINDEX MOBILE METRICS MOBILE MINUTIAE? COGNITIVE INSIGHTS MORE INFORMATION 7 WHY MaaS360?
  • 8. Why MaaS360 Cognitive UMM? MaaS360 with Watson delivers an industry-first set of productivity and security solutions for cognitive unified endpoint management, made possible through technologies and intelligence available exclusively from IBM. With Watson, MaaS360 actionable insights is informed by the aggregated cloud-sourced data of more than 12,000 MaaS360 implementations and backed by the IBM X-Force Exchange security community. And this is just the beginning. As cognitive capabilities are added, MaaS360 with Watson builds greater knowledge and context, for a smarter approach to securing and enabling endpoints, end users and everything in between. These capabilities create a valuable, trusted advisor and partner in the digital transformation of business. IBM MaaS360 cognitive unified mobility management combines device application and content management with strong security through one platform, allowing customers to enhance user productivity and maximise security withoutcompromising the user experience. IBM feeds data aggregated from implementations worldwide back into MaaS360 to continue the cycle of providing contextual and meaningfulintelligence. IBM Watson is a cognitive technology that can analyse and interpret all types of data, including unstructured text, images, audio and video. It utilises machine learning to grow its subject matter expertise in applications and systems. The natural language and data mining capabilities provided by Watson have been used to address a wide range of difficult problems, from cancer diagnosis and treatment decisions to weather forecasting. Watson has now partnered with MaaS360 to enlighten unified endpoint management for business transformation. IBM X-Force Exchange is a cloud-based threat intelligence sharing platform that facilitates research on security threats, the aggregation of security intelligence, and collaboration with peers. X-Force Exchange combines content from IBM, open-source projects and other third parties to provide relevant and detailed information about vulnerabilities, IP addresses, domains and web applications in real time. It is supported by IBM X-Force, one of the most recognised security research teams in theworld. IBM X-Force Exchange IBM MaaS360 MOBILE MINUTIAE? COGNITIVE INSIGHTS WHY MaaS360? MORE INFORMATION Learn more on the web about IBM Watson and IBM X-Force Exchange. 8 ADVISOR MOBILE SECURITYINDEX MOBILE METRICS
  • 9. "There is enormous potential in unified endpoint management when you incorporate cognitive technology like Watson into MaaS360 (UMM). ” "With this capability, we are able to get an in-depth feel of our device landscape instantly helping us make decisions faster as to where we need to evolve the platform." Brian Jacome, Senior Product Manager, Enterprise Mobility, RBC Royal Bank 9
  • 10. “With IBM (MaaS360 UMM), we gained a reliable and affordable cloud-based solution to help us protect mobile devices and empower our field staff.” Rich Mullens, Operations Manager, The Fundraising People, Australia 10
  • 11. Within four weeks, Patties moved from AirWatch (EMM) to MaaS360 (UMM) which enabled to decommission three servers and save in maintenance costs. “Headache gone.” "We've now got total visibility of where our devices are around the country, ensuring we can remote wipe corporate data from individual devices without damaging personal information.” Zelko Erdec, IT General Manager, Patties Foods Australia 11
  • 12. In addition to productivity gains, cost savings are considerable due to a reduced administration overhead, especially for devices that are stolen or have malware on them, since we can handle everything remotely.” “AirWatch (EMM) and Maas360 (UMM) were reasonable comparable in cost but in our view MaaS360 was easier to deploy and it also had antivirus functionality built-in.” Wayne Broekhals, IT Manager, Arrow International New Zealand 12
  • 13. “IBM Maas360 (UMM) is truly the complete package. It provides us with everything we need; it’s easier to manage and less expensive than our former IT solution.” Lisa Berta, Senior Desktop Services Officer, City of Greater Dandenong, Victoria, Australia 13
  • 14. "When it comes to purchasing iPADs and a Unified Mobility Management platform for the next two years, we found IBM to be very competitive, We are very confident that this partnership will strongly support our education goals and future aspirations" Damian Messer, Principal, St Virgil's College, Australia 14
  • 15. BlackBerry 2010- Feature phone 1999- MDM 2013- EMM 2016- UMM 2016+ Cognitive UMM 2017+ Start a free trial at https://trials.maas360.com Cognitive UMM for the price of MDM