Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation
|
|
- John McBride
- 8 years ago
- Views:
Transcription
1 Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation
2 Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up
3 Agenda 3 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up
4 BUSINESS PROBLEMS AND SOLUTIONS 4
5 Visibility is key in a constantly changing, distributed world Critical systems are globally distributed and in constant flux Find all assets on your network NOW! Patch hundreds of thousands of workstations, laptops and servers in minutes. Deploy a software application worldwide in days. Patch anywhere, anytime over any network. 5 Continuously enforce security configuration baselines, even on mobile and off-network devices.
6 Endpoint complexity continues to increase Speed, severity and complexity of malware attacks Patch O/S and application vulnerabilities with hours Endpoint device counts, devices and platforms Mobile/roaming endpoints New form factors and platforms Rapid, agile, automated remediation is needed 6 Compliance requirements to establish, prove and maintain continuous compliance Establish, prove and maintain continuous compliance Employee-owned devices
7 Agenda 7 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up
8 THE VALUE OF IBM ENDPOINT MANAGER 8
9
10 The power of IEM Speed IEM Platform Scalability 10 Ease of Use
11 IEM SECRET SAUCE 11
12 IBM Endpoint Manager architecture Network-friendly architecture delivers large packages without disrupting critical business applications IEM Content Update Service Support for a wide variety of devices: Windows, Mac, *nix, mobile Home Headquarters e/d SL Stores / Kiosks Ca bl 56k Single, intelligent agent with small footprint (<2% CPU, <10MB RAM) constantly checks policies also when not connected Cloud-based service continuously provides new patch, policy updates T1 line WAN T1 line 3G Coffee shop Internet WiFi Satellite Data center WiFi Hotel Airport Remote offices Distribution center One management server per 250,000 endpoints Use existing computers as Relays to minimize network traffic Full command and control by using patented Fixlet technology Whether it s a Mac connecting from hotel WiFi, a Windows laptop at 30K feet or a Red Hat Linux Server in your data center, IBM Endpoint Manager has it covered. In real time, at any scale.
13 IEM secret sauce IEM agent Continuous self-assessment Continuous policy enforcement Minimal system impact (<2% CPU, <10MB RAM) 13 TEM policy language (Fixlets) Thousands of out-of-the-box policies Best practices for operations and security Simple custom policy authoring Highly extensible/applicable across all platforms IEM messaging architecture Single server and console, aggregates data, analyzes and reports, manages up to 250K endpoints Relay infrastructure provides built-in redundancy and uses network BW and existing systems processing power in an efficient way IEM content update service continuously provides new/updated Fixlets
14 CHC reduced risk and TCO with IBM Endpoint Manager OVERVIEW Christian Hospital Centre (CHC) BUSINESS NEED Security oriented SOLUTION SUMMARY IBM Security Solutions IBM Endpoint Manager BENEFITS security risk TCO 6 clinics convalescent homes dozen polyclinics province of Liège, Belgium Numerous security problems led CHC to revise its security defences with the aim to protect the infrastructure against any possible threats in the future. Vulnerability assessment. Intrusion detection and prevention. Near real-time remediation of endpoint issues. Integrated asset and configuration management Frees up the equivalent of a full-time IT person, due to 50% reduction in helpdesk calls.
15 IEM FUNCTIONALITIES 15
16
17 IBM Endpoint Manager: unifying operations and security Common management agent Systems management Unified management console Common infrastructure Security management Single server IBM Endpoint Manager Desktop / laptop / server endpoint 17 Mobile endpoint Purpose-specific endpoint
18 Solution Sets IBM Endpoint Manager Microsoft Windows Mac OSX IBM AIX HP-UX Solaris VMWare ESX Server 7 versions of Linux ios Android Symbian Windows Mobile Lifecycle Management Software Use Analysis Patch Management Hardware, Software, Configuration Inventory Software Distribution OS Deployment Remote Control 18 Power Management Mobile Devices Patch Management Security and Compliance Core Protection Anti-Malware Patch Management Security Configuration Management Firewall DLP / Device Control (add on) Vulnerability Assessment Compliance Analytics 3rd Party Endpoint Protection Management 1 console, 1 agent, 1 server, many OSs
19 Endpoint Manager Value Across the Organization Unified Endpoint Management Microsoft Windows Mac OSX IBM AIX HP-UX Solaris VMWare ESX Server 7 versions of Linux ios Android Symbian Windows Mobile / Phone Mobile Workforce Enable password policies and device encryption Force encrypted backup Disable icloud sync Access to corporate , apps, VPN, WiFi contingent on policy compliance Selectively wipe corporate data if employee leaves company Fully wipe if device is lost or stolen 19 IT Operations Compress patch cycles to minutes or hours with 98-99% first pass success Patch 90+ OS versions and popular 3rd party Windows applications Software distribution OS deployment Remote control Server management IT Security and Compliance Facilities Ensure continuous Reduce annual compliance across all electricity costs by endpoints, regardless of $20-$50 per PC/Mac location or network Wake-on-LAN connectivity Current power usage Security configuration baselines and savings baselines models Vulnerability assessment Network self-quarantine Personal firewall Multi-vendor antimalware management Endpoint protection Data loss prevention / device control IT Asset Management Attain real-time visibility and control Network discovery Managed endpoint hardware inventory Managed endpoint software inventory Software use analysis to reclaim under-used applications PC software license compliance analysis 1 console, 1 agent, 1 server: 250,000 endpoints, 90+ OS versions
20 Agenda Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up 20
21 Use case 1: mobile device management
22 Use case 1: mobile device management Remediate or disconnect device in case of non-compliance 1 4 End-user enrolls its mobile device Increase productivity and employee motivation while limiting risk for corporate data loss Continuously check policies:encryption, 3 password, rootdetection,etc 22 2 Automated configuration of corporate connection ( , VPN)
23 Use case 2: security and compliance 3 Remediate in case of noncompliance Reduce risk (for data loss) on all assets by continuously enforcing policies by automating remediation 1 Report on assets and their security status 2 Enforce policy Baseline Adaptation of standard policies Custom policies 23
24 IBM Endpoint Manager and endpoint compliance Traditional compliance Continuous compliance 1. The security team develops compliance policies 1. Security and operations work together to formulate policies and service-level agreements (SLAs) 2. The security team runs an assessment tool (or tools) against that policy 2. Operations implements the baseline (patch, configuration, anti-virus, etc.) across all endpoints in the organization 3. The security team forwards findings to operations 4. Operations makes corrections as workload allows, one item at a time using different tools from security (which generates different answers to questions like how many endpoints do I have? ) 5. Users make changes causing endpoints to fall out of compliance again 3. Policy compliance is continuously monitored and enforced at the endpoint; changes are reported immediately 4. The security team can instantly check on the current state of security and compliance anytime 5. Security and operations teams work together to continually strengthen security and adjust to evolving requirements 6. Start assessment all over again 24
25 IBM deploys endpoint manager internally NEED Protect endpoint infra under changing condition SOLUTION Growing number of non-standard endpoints Security threats: increasing + more complex Real-time visibility and management IBM Endpoint Manager Continuous compliance BENEFITS Realized 78% decrease in endpoint security issues Costs saving well above $10 million Manage over 500,000 endpoints with 3 FTEs
26 Benefits Column 1 Column 2 Column Row 1 Row 2 Row 3 Row 4
27 Use case 3 - Patching 3 Report results Automate manual process Errors Speed Reduction of known security issues Load on helpdesk Outage risk Employee productivity 1 Retreive list of pretested patch packages relevant for the environment 2 Apply patches Optional: scheduling, user interaction, baseline, roll-back, pre-cache 27
28 IBM Endpoint Manager architecture Network-friendly architecture delivers large packages without disrupting critical business applications IEM Content Update Service Support for a wide variety of devices: Windows, Mac, *nix, mobile Home Headquarters e/d SL Stores / Kiosks Ca bl 56k Single, intelligent agent with small footprint (<2% CPU, <10MB RAM) constantly checks policies also when not connected Cloud-based service continuously provides new patch, policy updates T1 line WAN T1 line 3G Coffee shop Internet WiFi Satellite Data center WiFi Hotel Airport Remote offices Distribution center One management server per 250,000 endpoints Use existing computers as Relays to minimize network traffic Full command and control by using patented Fixlet technology Whether it s a Mac connecting from hotel WiFi, a Windows laptop at 30K feet or a Red Hat Linux Server in your data center, IBM Endpoint Manager has it covered. In real time, at any scale.
29 IEM secret sauce IEM agent Continuous self-assessment Continuous policy enforcement Minimal system impact (<2% CPU, <10MB RAM) 29 IEM policy language (Fixlets) Thousands of out-of-the-box policies Best practices for operations and security Simple custom policy authoring Highly extensible/applicable across all platforms IEM messaging architecture Single server and console, aggregates data, analyzes and reports, manages up to 250K endpoints Relay infrastructure provides built-in redundancy and uses network BW and existing systems processing power in an efficient way IEM content update service continuously provides new/updated Fixlets
30 Agenda Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up 30
31 Solution Sets IBM Endpoint Manager Microsoft Windows Mac OSX IBM AIX HP-UX Solaris VMWare ESX Server 7 versions of Linux ios Android Symbian Windows Mobile Lifecycle Management Software Use Analysis Patch Management Hardware, Software, Configuration Inventory Software Distribution OS Deployment Remote Control 31 Power Management Mobile Devices Patch Management Security and Compliance Core Protection Anti-Malware Patch Management Security Configuration Management Firewall DLP / Device Control (add on) Vulnerability Assessment Compliance Analytics 3rd Party Endpoint Protection Management 1 console, 1 agent, 1 server, many OSs
32 The power of IBM Endpoint Manager Speed IEM Platform Scalability Ease of Use
33 Additional info IBM Tivoli Endpoint Manager Landing Page IBM Tivoli Endpoint Manager v8.2 Information Center
34 Still questions? Contact details: Jonas Vercruysse T: E: jonas.vercruysse@be.ibm.com
35 BACK-UP SLIDES 35
36 Gartner Recognizes IBM as a Leader in Client Management Tools Magic Quadrant for Client Management Tools Terry Cosgrove, Ronni Coleville January 2012 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose 36
37 Gartner Recognizes IBM as a Visionary in Endpoint Protection Platforms and Mobile Device Management Software This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose 37
38 SCREENSHOTS 38
39 Mobile Devices 39
40 Endpoint Manager for Mobile Devices Dashboard 40
41 A Single Device View enables administrators and helpdesk personnel to easily view device details and take required action 41
42 A flexible enrollment process enables organizations to include a EULA and to collect critical device and employee data via customizable questions 42
43 Distribute apps using the Enterprise App Store 43
44 Web reports provide at-a-glance mobile device deployment overviews 44
45 A user-friendly ios Profile Configuration Wizard exposes the configuration capabilities of Apple s MDM APIs 45
46 A Self-Service Portal empowers employees to locate lost devices and perform tasks such as lock, clear passcode, and device wipe 46
47 ios Jailbreak Notification 47
48 A unified report of password policies across all mobile OS makes it easy for administrators to identify non-compliant devices 48
49 View installed apps on Android and ios devices 49
50 Software Use Analysis 50
51
52
Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time
1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationIronside Group Solutions
Ironside Group Solutions Your success is what drives us. Dev Ops Security Reporting Software Dev DevOps Enterprise Architecture Ronda Kiser-Oakes rkiser-oakes@ironsidegroup.com IBM Endpoint Manager Overview
More information6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationIBM Endpoint Manager for Server Automation
IBM Endpoint Manager for Server Automation Leverage advanced server automation capabilities with proven Endpoint Manager benefits Highlights Manage the lifecycle of all endpoints and their configurations
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationIBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationSymantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationBitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationReducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationHow To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationPrivate Geräte im Unternehmen - ein großes Potential mit Risiken
Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private
More informationAutomated, centralized management for enterprise servers
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationDevice Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationPatch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
More informationData Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot
Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance
More informationAltiris IT Management Suite 7.1 from Symantec
Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from
More informationSecuring Healthcare Data on Mobile Devices
Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationData Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot
Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance
More informationSymantec Server Management Suite 7.6 powered by Altiris technology
Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationTivoli Automation for Proactive Integrated Service Management
Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationTechnical Note. ForeScout MDM Data Security
Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................
More informationHealthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service
Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationSimplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1
More informationSymantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationIBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
More informationMalware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationCA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationCOMLINK Cloud Technical Specification Guide CLOUD DESKTOP
COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop
More informationEndpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
More informationCA Systems Performance for Infrastructure Managers
PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on
More informationMobility Challenges & Trends The Financial Services Point Of View
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationAddressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
More informationSimplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
More informationUnified Windows Device Management in the Enterprise
Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationCodeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationIBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationAltiris Server Management Suite 7.1 from Symantec
Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationHow PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006
How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor
More informationSalmon Group, Inc. An 8(a) Certified, Veteran owned company
www.salmongroupinc.com info@salmongroupinc.com Main Office: 888.751.5551 Fax: 240.607.6712 About Us We are a: Maryland-based, Veteran Owned Corporation Certified participant of the SBA 8(a) and Small Disadvantaged
More informationGartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More information