SlideShare uma empresa Scribd logo
1 de 18
Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2  ROI without Compromising Security, Management or Compliance
Introducing FaceTime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some reasons for delayed decision / deployment Non–Compliance Exposure Corporate Acceptable Usage Policies, FSA, SOX, SEC 17a, NASD,  HIPAA, GLBA Liability, Freedom of Information Companies Act 2006, MiFID Increasingly Complex ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Growth in IM/P2P threats Credit card #, NI#, Patient Health Info, Company Intellectual Property Information Leakage
So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries /  Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/  Archiving Auditing / Discovery Data Integrity Exporting Policies
Companies are Responding by Deploying Unified Communications ,[object Object],[object Object],Security and compliance are key concerns …  Resulting in a Heterogeneous Environment
Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Must-Have” Requirements for Unified Communications
FaceTime ,[object Object],Content Control /Security Compliance & Discovery Management & Reporting Application Visibility / Control
FaceTime Product Portfolio
FaceTime Complements IBM Sametime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY
How does this help sell more licences for IBM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Don’t let any of the following stop / delay your deal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Customer and Project examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How the FaceTime team can support you ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare
Questions?

Mais conteúdo relacionado

Mais procurados

Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Companyexpetec
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Steering microservices with istio
Steering microservices with istioSteering microservices with istio
Steering microservices with istioHemanth Malla
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 SlidecastKieng Iv
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 

Mais procurados (19)

Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate Profile
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Proactive Computer Support Company
Proactive Computer Support CompanyProactive Computer Support Company
Proactive Computer Support Company
 
F-Secure Corporation
F-Secure CorporationF-Secure Corporation
F-Secure Corporation
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Emerging trends in it
Emerging trends in itEmerging trends in it
Emerging trends in it
 
Data com
Data comData com
Data com
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
CCNSE
CCNSECCNSE
CCNSE
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Evolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance RegulationsEvolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance Regulations
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Steering microservices with istio
Steering microservices with istioSteering microservices with istio
Steering microservices with istio
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 Slidecast
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 

Destaque

FSS Canada Launch Presentation
FSS Canada Launch PresentationFSS Canada Launch Presentation
FSS Canada Launch Presentationbpickers
 
Workshop socialnetworking hra
Workshop socialnetworking hraWorkshop socialnetworking hra
Workshop socialnetworking hraLe Thuy Hanh
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening MicrotravelLe Thuy Hanh
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosynedanphilpott
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisisJane Jordan-Meier
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10Dan Bolser
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on BlackberryChris Sparshott
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guideChris Sparshott
 
Chuong 6 nhung nen tang cua tang truong
Chuong 6   nhung nen tang cua tang truongChuong 6   nhung nen tang cua tang truong
Chuong 6 nhung nen tang cua tang truongLe Thuy Hanh
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26njhousehelper
 
Chuong 1 tu bat on vi mo den con duong tai co cau
Chuong 1   tu bat on vi mo den con duong tai co cauChuong 1   tu bat on vi mo den con duong tai co cau
Chuong 1 tu bat on vi mo den con duong tai co cauLe Thuy Hanh
 
Cicada Consulting
Cicada ConsultingCicada Consulting
Cicada Consultingpatrickdu
 
Chuong 7 doi moi tu duy va cai cach the che
Chuong 7   doi moi tu duy va cai cach the cheChuong 7   doi moi tu duy va cai cach the che
Chuong 7 doi moi tu duy va cai cach the cheLe Thuy Hanh
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global BrainDan Bolser
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategyGood Circle
 
IBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireIBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireChris Sparshott
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsLe Thuy Hanh
 

Destaque (20)

FSS Canada Launch Presentation
FSS Canada Launch PresentationFSS Canada Launch Presentation
FSS Canada Launch Presentation
 
Workshop socialnetworking hra
Workshop socialnetworking hraWorkshop socialnetworking hra
Workshop socialnetworking hra
 
gansu
gansugansu
gansu
 
Opening Microtravel
Opening MicrotravelOpening Microtravel
Opening Microtravel
 
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with MnemosyneFISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
FISMArts - Improving Retention of FISMA Guidance Details with Mnemosyne
 
Appearances do matter leadership in a crisis
Appearances do matter leadership in a crisisAppearances do matter leadership in a crisis
Appearances do matter leadership in a crisis
 
BioWikis BSB10
BioWikis BSB10BioWikis BSB10
BioWikis BSB10
 
Install Lotus Connections on Blackberry
Install Lotus Connections on BlackberryInstall Lotus Connections on Blackberry
Install Lotus Connections on Blackberry
 
Writing
WritingWriting
Writing
 
Lotus Mashups step by step installation guide
Lotus Mashups step by step installation guideLotus Mashups step by step installation guide
Lotus Mashups step by step installation guide
 
Chuong 6 nhung nen tang cua tang truong
Chuong 6   nhung nen tang cua tang truongChuong 6   nhung nen tang cua tang truong
Chuong 6 nhung nen tang cua tang truong
 
Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26Luxury Real Estate Stats 4 26
Luxury Real Estate Stats 4 26
 
Chuong 1 tu bat on vi mo den con duong tai co cau
Chuong 1   tu bat on vi mo den con duong tai co cauChuong 1   tu bat on vi mo den con duong tai co cau
Chuong 1 tu bat on vi mo den con duong tai co cau
 
Cicada Consulting
Cicada ConsultingCicada Consulting
Cicada Consulting
 
Chuong 7 doi moi tu duy va cai cach the che
Chuong 7   doi moi tu duy va cai cach the cheChuong 7   doi moi tu duy va cai cach the che
Chuong 7 doi moi tu duy va cai cach the che
 
Wikipedia and the Global Brain
Wikipedia and the Global BrainWikipedia and the Global Brain
Wikipedia and the Global Brain
 
Developing your social media strategy
Developing your social media strategyDeveloping your social media strategy
Developing your social media strategy
 
IBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To QuestionnaireIBM SaaS eMeeting To Questionnaire
IBM SaaS eMeeting To Questionnaire
 
Breaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbsBreaking thinking.vietnam.dtnbs
Breaking thinking.vietnam.dtnbs
 
Presentation1
Presentation1Presentation1
Presentation1
 

Semelhante a IBM Sametime and Facetime

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionSaurabh Sharma
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinJoe Sarno
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Developing cross platform solutions
Developing cross platform solutionsDeveloping cross platform solutions
Developing cross platform solutionsSandeep Marathe
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 

Semelhante a IBM Sametime and Facetime (20)

IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Top Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre SolutionTop Security Trends In A Hosted Contact Centre Solution
Top Security Trends In A Hosted Contact Centre Solution
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)Mobile Voice Recording (MVR)
Mobile Voice Recording (MVR)
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Developing cross platform solutions
Developing cross platform solutionsDeveloping cross platform solutions
Developing cross platform solutions
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 

Mais de Chris Sparshott

2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winnersChris Sparshott
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winnersChris Sparshott
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event videoChris Sparshott
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Chris Sparshott
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?Chris Sparshott
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewChris Sparshott
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reductionChris Sparshott
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoChris Sparshott
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSChris Sparshott
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and SubscriptionChris Sparshott
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBMChris Sparshott
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingChris Sparshott
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather informationChris Sparshott
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1Chris Sparshott
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureChris Sparshott
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireChris Sparshott
 

Mais de Chris Sparshott (20)

IBM and Apache Spark
IBM and Apache SparkIBM and Apache Spark
IBM and Apache Spark
 
2016 IBM choice award winners
2016 IBM choice award winners2016 IBM choice award winners
2016 IBM choice award winners
 
2016 IBM Beacon award winners
2016 IBM Beacon award winners2016 IBM Beacon award winners
2016 IBM Beacon award winners
 
How to create an event video
How to create an event videoHow to create an event video
How to create an event video
 
IBM Acquisitions
IBM AcquisitionsIBM Acquisitions
IBM Acquisitions
 
Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015Maximo licensing information and usage restrictions 11 March 2015
Maximo licensing information and usage restrictions 11 March 2015
 
SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?SPSS Modeler 16 What's New!?
SPSS Modeler 16 What's New!?
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
WebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overviewWebSphere application server 8.5.5 - quick overview
WebSphere application server 8.5.5 - quick overview
 
Urban code - DevOps - cost reduction
Urban code - DevOps - cost reductionUrban code - DevOps - cost reduction
Urban code - DevOps - cost reduction
 
Bluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demoBluemix, PaaS by IBM - Screenshot demo
Bluemix, PaaS by IBM - Screenshot demo
 
Cloud Computing IaaS
Cloud Computing IaaSCloud Computing IaaS
Cloud Computing IaaS
 
Cloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaSCloud computing From Iaas to PaaS to SaaS
Cloud computing From Iaas to PaaS to SaaS
 
IBM Software Support and Subscription
IBM Software Support and SubscriptionIBM Software Support and Subscription
IBM Software Support and Subscription
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
SUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensingSUN Solaris Zones WebSphere Portal licensing
SUN Solaris Zones WebSphere Portal licensing
 
Domino must gather information
Domino must gather informationDomino must gather information
Domino must gather information
 
The business value of notes 8.5.1
The business value of notes 8.5.1The business value of notes 8.5.1
The business value of notes 8.5.1
 
IBM SaaS Change Profile Picture
IBM SaaS Change Profile PictureIBM SaaS Change Profile Picture
IBM SaaS Change Profile Picture
 
IBM SaaS Complete A Questionnaire
IBM SaaS Complete A QuestionnaireIBM SaaS Complete A Questionnaire
IBM SaaS Complete A Questionnaire
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

IBM Sametime and Facetime

  • 1. Securing Instant Messaging and Unified Communications and Collaboration. Maximize UC 2 ROI without Compromising Security, Management or Compliance
  • 2.
  • 3.
  • 4. So what did (and do) we do for Email? SECURITY Anti-Virus Anti-SPAM CONTROL / FILTERING File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Group to Group policies. Disclaimers COMPLIANCE Reporting Logging / Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 5. Why is UC and IM any different...? SECURITY Anti-Virus Anti-SPAM Anti-SPIM CONTROL / FILTERING Modality Control File Size / Type Policies Inbound / Outbound Lexical Analysis, Ethical Boundaries / Disclaimers Group to Group policies. COMPLIANCE Reporting Logging/ Archiving Auditing / Discovery Data Integrity Exporting Policies
  • 6.
  • 7. Unified Communications Today – Heterogeneous Silos Workspace Client IM Client Email Client VoIP Client Conf Client Identity (Active Directory) Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Presence Policy Reporting Ad-hoc
  • 8. FaceTime’s Vision of Unified Communications Security Presence, Identity & Federation Policy & Management Reporting Compliance
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. FaceTime is Mission Critical for Large Enterprises Over 1,000 customers and 5 Million seats deployed Financial Services & Insurance Manufacturing & Consumer Technology & Telecommunications Energy & Healthcare

Notas do Editor

  1. 09/08/09
  2. Headquartered in Foster City, CA Founded 1998; 1st IM partnership w/AOL -1999 500+ corporate customers; over 2M seats 8 of top 10 US Banks, 4 of top 5 Canadian Banks, 70% of largest Financial Services 154 employees: N. America, India, EMEA, APAC Privately funded: $30M total since 2001 24 month relationship with XBlock Systems, then acquired them in May 2005 Financials Privately held; industry analysts estimate $8m+ FaceTime provides security and compliance for Greynets – IM, P2P, adware/spyware 650 customers; over 2M seats under management 8 of top 10 YS Banks; 70% of largest Financial Services Horizontal: GE, Apple, Motorola, Medtronic, NCR, DISA FaceTime enables safe use and control of “Greynets” Security: Block worms, protect intellectual property, stop SpIM, scan for malware Compliance: Logging, auditing, archiving messages Management: Applying powerful and granular policies FaceTime has the strongest market position Largest deployed base of seats Largest employee base (150 employees w/ >90 in R&D) Largest security research team (FaceTime Security Labs)
  3. BEST PRACTICES DEPLOYMENT 1: Deploy FTEE to ensure compliance and security Guarantee compliance with TrueCompliance TM Stop worms and viruses and block SPIM Stop rogue IM & P2P and block circumvention at the perimeter 2: Monitor and analyze usage patterns Who is using what networks? What features are being used? File transfer, VoIP, app sharing, etc. How much and what P2P usage is going on? 3: Formulate usage policies By user, network and capabilities 4: Implement and enforce policies IMA for logging and audit workflow RTG to control non-compliant use
  4. 09/08/09
  5. 09/08/09
  6. 09/08/09
  7. 09/08/09
  8. 09/08/09