IBM United States Software Announcement , dated February 3, 2015

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "IBM United States Software Announcement 215-078, dated February 3, 2015"

Transcription

1 IBM United States Software Announcement , dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps, and content Table of contents 1 Overview 8 Publications 2 Key prerequisites 8 Technical information 2 Planned availability date 9 Ordering information 2 Description 12 Terms and conditions 6 Product positioning 14 Prices 6 Program number At a glance IBM (R) MobileFirst Protect, formerly known as IBM MaaS360 (R), delivers end-to-end mobile solutions for your enterprise. New products include: Professional Laptops solutions Overview, formerly known as IBM MaaS360, delivers a comprehensive, secure, and cloud-based enterprise mobility management platform that provides complete mobility management and comprehensive security of mobile devices, applications, documents, s, and access to the web from a single portal. MobileFirst Protect provides a robust cloud-based mobility management platform that spans across devices, users, applications, documents, and expenses. MobileFirst Protect offerings are available on a secure, multitenant architecture, and offer immediate insight and control without the added costs and complexities of deploying hardware and software, dealing with intricate configurations, and dedicating additional resources to create and support the solution on an ongoing basis. New offerings Laptops solutions delivers a more comprehensive enterprise mobility management solution that includes managing your corporate owned and bring your own PC devices. MobileFirst Protect Laptops solutions provide the ability to enroll, configure, manage, secure, and report on Mac OS X and Microsoft TM Windows TM PC based devices alongside smartphones and tablets. Organizations can maintain consistent security policies and profiles across both corporate and employee-owned devices within the same management console. Professional, a mobility management bundle for small to mid-size businesses, provides everything you would expect from a powerful, enterprise-class MDM solution, but affordable and simple enough for any organization to implement and use. MobileFirst Protect Professional IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 1

2 includes everything your small to mid-size business needs to manage the entire mobile device lifecycle from enrollment to policy management, security, application management, document distribution, and support. MobileFirst Protect Professional is provided from a single cloud platform offered as a subscription service that includes on-demand access to the platform, setup, upgrades, maintenance, and 24 x 7 x 365 support. With Professional, you have the flexibility to start managing a small group of devices now, and scale up as needs change. Key prerequisites Supported browser Internet connection Mobile devices running on supported mobile operating systems Planned availability date February 3, 2015 Description solutions, formerly known as IBM MaaS360 solutions, provide the ability to provision, manage, and secure corporate and employee-owned devices and data over the air. All associated orderable license part number descriptions have been updated with the new product name. Product number New product name Previous product name 5725-S34 Devices 5725-S36 Applications 5725-S37 App Security 5725-S38 Content 5725-S39 Browser 5725-S40 Mgmt 5725-S41 for BlackBerry 5725-S42 Expenses 5725-S43 Secure Mail 5725-S44 Content Service 5725-S45 Threat Mgmt 5725-S46 Mgmt Suite 5725-S47 Prod Suite Device Management Application Management Application Security Content Management IBM MaaS360 Secure Browser Management IBM MaaS360 Enterprise Server Management for BlackBerry Expense Management IBM MaaS360 Secure Mail IBM MaaS360 Content Service Threat Management IBM MaaS360 Advanced Mobile Management Suite IBM MaaS360 Secure Productivity Suite TM IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 2

3 Product number New product name Previous product name 5725-S48 Gateway Suite 5725-S49 Content Suite Devices Enterprise Gateway Suite IBM MaaS360 Secure Doc Sharing Suite The core mobility device management features include device enrollment, configuration, security policy management, and device actions, such as send message, locate, lock, and wipe. The advanced mobility device management features include automated compliance rules, bring your own device (BYOD) privacy settings, and mobility intelligence dashboards and reporting. The core mobile device management features include the following operating system specific capabilities: Mac ios: MobileFirst Protect Devices for Mac ios uses an agent that interfaces with Apple Mobile Device Management API and the Apple Push Notification Service to provide management, security, and reporting capabilities for devices that run Mac ios 4, or later. Android: MobileFirst Protect Devices for Android uses an agent that interfaces with the Android mobile device management API framework to provide management, security, and reporting for Android devices that run Version 2.2, or later. In addition, MobileFirst Protect supports the mobility device management API frameworks of Android OEM manufacturers, such as Samsung SAFE, Amazon Kindle Fire, LG Gate, and Motorola electronic dance music. Microsoft Windows Phone: MobileFirst Protect Devices for Microsoft Windows Phone uses an agent that interfaces with Microsoft Push Notification Services and Microsoft ActiveSync to provide management, security, and reporting for Microsoft Windows phone devices that run Version 7.5, or later. BlackBerry research in motion (RIM): MobileFirst Protect Devices for BlackBerry uses an agent that interfaces with BlackBerry Push Notification Services and the BlackBerry Internet Service to provide management, security, and reporting for Java-based BlackBerry devices that run Version 5.0, or later. MobileFirst Protect Cloud Extender TM : MobileFirst Protect Cloud Extender is included with MobileFirst Protect Mobility Device Management subscriptions and provides the ability to securely integrate with enterprise systems such as Microsoft Exchange, Microsoft Office 365, Active Directory, LDAP, IBM Notes (R) Traveler, and certificate authorities. Management includes key features that support Microsoft Exchange ActiveSync and Notes Traveler. Microsoft Exchange ActiveSync provides support for mobile devices connecting to Microsoft Exchange over the ActiveSync protocol. Features include core mobile device management functions, such as the ability to configure devices, create, enforce ActiveSync policies (passcode, block, or allow access to ); and take device actions, such as lock and wipe, and detailed report on device attributes. Notes Traveler provides support for mobile devices that connect to IBM Notes over Notes Traveler protocol. Features include the ability to configure devices, block or allow devices, enforce passcode policies, wipe devices, and develop detailed report on device attributes. Applications provides the ability to add applications and distribute them to supported devices managed by MobileFirst Protect. This includes MobileFirst Protect App Catalog, an on-device application for users to view, install, and receive device notifications when apps have available updates. Application Security provides additional data protection for enterprise applications that use MobileFirst Protect WorkPlace SDK during development or the MobileFirst Protect application wrapping capability. MobileFirst Protect Application Security integrates the app with the IBM MobileFirst IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 3

4 Protect Secure Productivity Suite. This enables single sign-on, intranet access through MobileFirst Protect Mobile Enterprise Gateway, and enforcement of data security settings. Content allows the administrator to add and distribute documents to the supported devices that are managed by MobileFirst Protect Devices. It includes MobileFirst Protect Doc Catalog, an on-device, password-protected container that provides a secure and simple way for users to access, view, and share documents. It includes seamless access to distributed content and repositories such as Microsoft SharePoint, Box, and Google Drive. Access to private Microsoft SharePoint and Microsoft Windows File Shares are available with the MobileFirst Protect Enterprise Gateway. Documents managed through MobileFirst Protect can be version controlled, audited, and secured through data loss prevention (DLP) policy options, such as require authentication, restrict copy-paste functionality, and block from being opened or shared in other applications. MobileFirst Protect Content experience can be enhanced with the following two products: MobileFirst Protect Document Sync provides users with the ability to easily and securely synchronize user content across managed mobile devices. Administrators can ensure that policies, such as restricting cut, copy, and paste, and blocking content from being opened or shared in other apps or the policies are defined and are in place for user content across devices. Content is stored securely, both in the cloud and on the device, and accessed only through the MobileFirst Protect Doc Catalog. MobileFirst Protect Document Edit provides users with the ability to create, edit, search, and save content securely, all in an encrypted container on Mac ios and Android devices. Content Service provides users with the ability to upload application packages and documents to MobileFirst Protect's Content Distribution system. MobileFirst Protect Content Service Storage provides users the ability to purchase a total amount of data storage available for use with the MobileFirst Protect Content Service. MobileFirst Protect Content Service Bandwidth provides users the ability to purchase the total amount of bandwidth available for use with the MobileFirst Protect Content Service. Organizations with MobileFirst Protect Content Service will also need to purchase at least one entitlement of both MobileFirst Protect Content Service Storage and MobileFirst Protect Content Service Bandwidth. Expenses allows the administrator to create data usage policies and assign them to supported devices that are managed by MobileFirst Protect (Saas), and assign these policies at a device, group, or global level, and configure alert thresholds and messaging for both in network and roaming data usage. Browser is a full-featured web browser that enables secure access to corporate intranet sites and enforces compliance of content policies by defining website filtering and security policies to ensure that users only access approved web content that is based on a number of content categories, such as social networking, explicit, or malware sites. It includes the ability to disable native and third-party web browsers either through application policy or blacklisting when combined with MobileFirst Protect Device Management. It allows whitelist exceptions to websites, restrict cookies; copy, paste, and print features; and enables Kiosk mode. Secure Mail provides a separate and secure office productivity application for users to access and manage , calendar, and IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 4

5 contacts. It is able to control s and attachments to prevent data leakage by restricting the ability to forward or move content to other applications, to enforce authentication, restrict cut, copy, and paste, and lock down attachments for view only. Gateway Suite allows supported apps on Mac ios and Android devices to securely and seamless communicate back to resources on the company's internal network. The following gateway products are included in the Gateway suite, or can be purchased separately. MobileFirst Protect Gateway for Browser allows supported devices to access approved internal websites without requiring a full-device level, virtual private networks (VPN) connection. MobileFirst Protect Gateway for Documents provides users, outside the enterprise network, secure, seamless access to internal Microsoft SharePoint sites, Microsoft Windows File Shares, and other file stores without requiring a full-device, VPN connection. MobileFirst Protect Gateway for Apps provides users, outside the enterprise network, secure, seamless access to internal application resources without requiring a full-device, VPN connection. for BlackBerry provides support for BlackBerry Enterprise Server connected mobile devices by utilizing BlackBerry APIs. Features include remote actions such as send a message, reset passcode, assign BlackBerry Enterprise Server policy and wipe, as well as detailed reporting on device attributes. Installation of MobileFirst Protect Cloud Extender is required. This is available only for devices viewed or managed with MobileFirst Protect through BlackBerry Enterprise Server 5.0. Threat Management provides the ability to detect, alert, and remediate enterprise malware on Mac ios and Android devices. Additionally, it provides advanced jailbreak, root and hider detection with over the air updates for security definitions. Administrators can configure compliancy policy on these advanced threats and immediately remediate the vulnerability, improving the security of BYOD and corporate owned devices. Professional provides small and medium-sized businesses with a fast and simple way to remotely configure smartphones and tablets, enforce security policies, push apps and docs, and protect the data on corporate and personal devices. You can gain access to the right mobility management capabilities for your business quickly, easily, and affordably. Laptop provides you with the ability to enroll, configure, manage, secure, and report on Mac OS X and Microsoft Windows PC based devices alongside smartphones and tablets. Organizations can maintain consistent security policies and profiles across both corporate and employee-owned devices within the same MobileFirst Protect management console. MobileFirst Protect Laptop for Microsoft Windows-based PCs provides over-the-air enrollment and inventory management reporting on hardware, operating system, and software information. The endpoint security reporting module provides interactive reporting and data analysis for organization provided applications such as anti-virus, backup and recovery, data encryption, and personal firewall as well as missing operating system patches. The data protection module provides interactive reporting and analysis for security services, including data encryption, data leak prevention, and backup and recovery, and other integrated applications. It supports Microsoft Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8+, and Microsoft Windows 8+ Pro (including 32 bit and 64 bit where applicable). MobileFirst Protect Laptop for Mac OS X provides over-the-air enrollment and inventory management reporting on hardware, operating system, and software information. The endpoint security reporting module provides interactive reporting and data analysis for applications such as anti-virus, backup IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 5

6 and recovery, data encryption, and personal firewall as well as missing operating system patches. The data protection module provides interactive reporting and analysis for data security services, including data encryption. The configuration management module provides remote management of a number of device and user settings, including password, , VPN, and Wi-Fi. It supports Mac OS X version , or later. OS Patch Management acquires, tests, and installs multiple patches (code changes) to an administered computer system. The service performs an install of patches, confirms installation of patches, and reports on the patch status for all devices, with minimal, if any, user intervention. All patches are prepackaged and pretested, and includes Microsoft operating system patches only, corrupt patch detection, patch rollback, bandwidth throttling, and an audit of all installed Microsoft operating patches. Laptop Lifecycle Management provides the capabilities of MobileFirst Protect Laptop and adds the following capabilities: Allows you to upload packages to the MobileFirst Protect Content Service platform and schedule distribution of payload to devices, which are managed by the MobileFirst Protect Laptop service for Microsoft Windows. You control all aspects of distribution, including installation instructions and targeting at a device, group, or global level. You are responsible for all packaging and installation file creation. IBM does not provide installation package creation support. Organizations purchasing MobileFirst Protect Laptop Lifecycle Management also need to purchase the appropriate storage and bandwidth to meet their needs through the MobileFirst Protect Content Service Storage and MobileFirst Protect Content Service Bandwidth offerings. Product positioning Feedback from global customers have taught that true enterprise mobility is more than just mobile device management. It is about: App distribution, security, and management. Sharing and securing content on smartphones and tablets. Fast deployment and easy management so users and IT can spend time getting down to business. Providing a consistent and unified solution for managing all mobile devices, including smartphones, tablets, and computers. Program number Program number New program name Previous program name 5725-S34 Devices 5725-S36 Applications 5725-S37 App Security 5725-S38 Content 5725-S39 Browser 5725-S40 Mgmt Device Management Application Management Application Security Content Management IBM MaaS360 Secure Browser Management IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 6

7 Program number New program name Previous program name 5725-S41 for BlackBerry 5725-S42 Expenses 5725-S43 Secure Mail 5725-S44 Content Service 5725-S45 Threat Mgmt 5725-S46 Mgmt Suite 5725-S47 Prod Suite 5725-S48 Gateway Suite 5725-S49 Content Suite IBM MaaS360 Enterprise Server Management for BlackBerry Expense Management IBM MaaS360 Secure Mail IBM MaaS360 Content Service Threat Management IBM MaaS360 Advanced Mobile Management Suite IBM MaaS360 Secure Productivity Suite Enterprise Gateway Suite IBM MaaS360 Secure Doc Sharing Suite Note: All program number orderable license part numbers have been updated to reflect the new program names in Passport Advantage (R). New programs Program number 5725S S S S U20 Program name Laptop Laptop Lifecycle Laptop Location Laptop Security Professional Education support Comprehensive education for Cloud and Smarter Infrastructure products is offered through highly-qualified Global Training Providers, who offer authorized training for IBM clients, IBM Business Partners, and IBM employees. These training providers offer instructor-led and self-paced learning content developed by IBM, as well as their own customized training based on standard IBM course materials. For additional information, visit the following website Call IBM training at 800-IBM-TEACH ( ) for catalogs, schedules, and enrollments. Offering Information Product information is available via the Offering Information website IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 7

8 Also, visit the Passport Advantage website Publications No publications will be shipped with these products. The IBM Publications Center The Publications Center is a worldwide central repository for IBM product publications and marketing material with a catalog of 70,000 items. Extensive search facilities are provided. A large number of publications are available online in various file formats, and they can all be downloaded by all countries. Services Software Services IBM Software Services has the breadth, depth, and reach to manage your services needs. You can leverage the deep technical skills of our lab-based, software services team and the business consulting, project management, and infrastructure expertise of our IBM Global Services team. Also, we extend our IBM Software Services reach through IBM Business Partners to provide an extensive portfolio of capabilities. Together, we provide the global reach, intellectual capital, industry insight, and technology leadership to support a wide range of critical business needs. To learn more about IBM Software Services or to contact a Software Services sales specialist, visit Technical information Specified operating environment Hardware requirements solutions are accessed through the Internet. No customer maintained servers are required beyond the user desktop machines used to access the service. Software requirements supports the following web browsers: Google Chrome Microsoft Internet Explorer Mozilla Firefox Apple Safari The program's specifications and specified operating environment information may be found in documentation accompanying the program, if available, such as a readme file, or other information published by IBM, such as an announcement letter. Documentation and other program content may be supplied only in the English language. IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 8

9 Planning information Packaging This offering is delivered through the Internet. There are no physical media or publications delivered. Ordering information This product is only available via Passport Advantage. It is not available as shrinkwrap. Product group: Enterprise Mobility Management Program number Program name 5725-S34 Devices 5725-S36 Applications 5725-S37 App Security 5725-S38 Content 5725-S39 Browser 5725-S40 Mgmt 5725-S41 for BlackBerry 5725-S42 Expenses 5725-S43 Secure Mail 5725-S45 Threat Mgmt 5725-S46 Mgmt Suite 5725-S47 Prod Suite 5725-S48 Gateway Suite 5725-S49 Content Suite 5725-U20 Professional Product group: Cloud Content Storage and Bandwidth Program number Program name 5725-S44 Content Service Product group: Endpoint Management Program number Program name 5725-S50 Laptop 5725-S51 Laptop Lifecycle 5725-S52 Laptop Location 5725-S53 Laptop Security Passport Advantage Laptop 5725-S50 Part number D1ALNLL D1ALMLL Part number description Laptop Client Device Overage Laptop Client Device per Month IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 9

10 Part number D1ALLLL Part number description Laptop Daily Fee for Partial Month Laptop Lifecycle 5725-S51 Part number D1AM2LL D1AM1LL D1AM0LL Part number description Laptop Lifecycle Management Client Device Overage Laptop Lifecycle Management Client Device per Month Laptop Lifecycle Management Daily Fee for Partial Month Laptop Location 5725-S52 Part number D1AM9LL D1AM8LL D1AM7LL Part number description Laptop Location Client Device Overage Laptop Location Client Device per Month Laptop Location Daily Fee for Partial Month Laptop Security 5725-S53 Part number D1AMDLL D1AMCLL D1AMBLL Part number description Laptop Security and Compliance Client Device Overage Laptop Security and Compliance Client Device per Month Laptop Security and Compliance Daily Fee for Partial Month Professional 5725-U20 Part number D1DKELL D1DKDLL D1DKCLL D1DKHLL D1DKGLL D1DKFLL Part number description Professional Managed Client Device Overage Professional Managed Client Device Daily Fee for Partial Month Professional Managed Client Device per Month Professional Overage Professional Daily Fee for Partial Month Professional per Month Charge metric Program name PID number Charge metrics Devices Applications App Security 5725-S34 Managed Client Device, 5725-S36 Managed Client Device, 5725-S37 Managed Client Device, IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 10

11 Program name PID number Charge metrics Content Browser Mgmt for BlackBerry Expenses Secure Mail Content Service Threat Mgmt Mgmt Suite Prod Suite Gateway Suite Content Suite Laptop Laptop Lifecycle Laptop Location Laptop Security Professionl Licensing metric definitions Managed Client Device 5725-S38 Managed Client Device, 5725-S39 Managed Client Device, 5725-S40 Managed Client Device, 5725-S41 Managed Client Device, 5725-S42 Managed Client Device, 5725-S43 Managed Client Device, 5725-S44 Managed Client Device,, Gigabyte 5725-S45 Managed Client Device, 5725-S46 Managed Client Device, 5725-S47 Managed Client Device, 5725-S48 Managed Client Device, 5725-S49 Managed Client Device, 5725-S50 Managed Client Device, 5725-S51 Managed Client Device, 5725-S52 Managed Client Device, 5725-S53 Managed Client Device, 5725-U20 Managed Client Device, Managed Client Device is a unit of measure by which IBM SaaS can be obtained. A Client Device is a single user computing device or special purpose sensor or telemetry device that requests the execution of or receives for execution a set of commands, procedures, or applications from or provides data to another computer system that is typically referred to as a server or is otherwise managed by the server. Multiple Client Devices may share access to a common server. A Client Device may have some processing capability or be programmable to allow a user to do work. Licensee must obtain Managed Client Device entitlements for every Client Device managed by the IBM SaaS during the measurement period specified in customer's Proof of Entitlement (PoE) or Transaction Document. Client Device Client Device is a unit of measure by which the IBM SaaS can be obtained. A Client Device is a single user computing device or special purpose sensor or telemetry device that requests the execution of or receives for execution a set of commands, procedures, or applications from or provides data to another computer system that is typically referred to as a server or is otherwise managed by the server. Multiple Client Devices may share access to a common server. A Client Device may have some processing capability or be programmable to allow a user to do work. Customer must obtain entitlements for every Client Device which runs, provides data to, uses services provided by, or otherwise accesses the IBM SaaS during the measurement period specified in customer's PoE or Transaction Document. " IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 11

12 is a unit of measure by which the IBM SaaS can be obtained. Customer must obtain separate, dedicated entitlements for each unique Authorized User given access to the IBM SaaS in any manner directly or indirectly (for example, via a multiplexing program, device, or application server) through any means. Sufficient entitlements must be obtained to cover the number of Authorized Users given access to the IBM SaaS during the measurement period specified in customer's PoE or Transaction Document. Gigabyte Gigabyte is a unit of measure by which the IBM SaaS can be obtained. A gigabyte is defined as 2 to the 30th power bytes of data (1,073,741,824 bytes). Sufficient entitlements must be obtained to cover the total number of gigabytes processed by the IBM SaaS during the measurement period specified in customer's PoE or Transaction Document. Terms and conditions The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the IBM International Passport Advantage Agreement, the International Passport Advantage Express (R) Agreement, the Cloud Services Agreement and associated Service Descriptions, or the IBM SaaS Terms of Use. This product is only available via Passport Advantage. It is not available as shrinkwrap. Subscription The IBM International Passport Advantage Agreement and the IBM SaaS Terms of Use or the IBM Cloud Services Agreement (CSA) and the Service Description govern your use of this offering. Agreement for Acquisition of Software Maintenance Technical support Technical support is provided for IBM SaaS and enabling software, as applicable, during the subscription period. Any enhancements, updates and other materials provided by IBM as part of any such technical support are considered to be part of IBM SaaS or enabling software, as applicable, and therefore governed by the SaaS Terms of Use or the CSA and associated Service Description. Technical support is included with IBM SaaS and is not available as a separate offering. Refer to additional technical support information in the IBM Software as a Service Terms of Use document for the program. Terms of use The program's Terms of Use and CSA Service Description document is available on the IBM Software as a Service Agreements website Limited warranty If warranted, refer to the warranty as stated in the Terms of Use document or the Cloud Services Agreement for this offering. IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 12

13 Money-back guarantee No Volume orders (IVO) No Passport Advantage applies Yes, and through the Passport Advantage website at Usage restriction Yes. For additional information, refer to the License Information document that is available on the IBM Software License Agreement website Software Subscription and Support applies No IBM Operational Support Services - SoftwareXcel No System i Software Maintenance applies No Variable charges apply No Educational allowance available Not applicable. Statement of good security practices IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 13

14 Prices For current prices, visit IBM Global Financing IBM Global Financing offers competitive financing to credit-qualified customers to assist them in acquiring IT solutions. Offerings include financing for IT acquisition, including hardware, software, and services, from both IBM and other manufacturers or vendors. Offerings (for all customer segments: small, medium, and large enterprise), rates, terms, and availability can vary by country. Contact your local IBM Global Financing organization or visit IBM Global Financing offerings are provided through IBM Credit LLC in the United States, and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Rates are based on a customer's credit rating, financing terms, offering type, equipment type, and options, and may vary by country. Other restrictions may apply. Rates and offerings are subject to change, extension, or withdrawal without notice. Financing from IBM Global Financing helps you preserve cash and credit lines, enables more technology acquisition within current budget limits, permits accelerated implementation of economically attractive new technologies, offers payment and term flexibility, and can help match project costs to projected benefits. Financing is available worldwide for credit-qualified customers. For more financing information, visit Trademarks IBM, Passport Advantage, System i, Notes and Express are registered trademarks of IBM Corporation in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product, and service names may be trademarks or service marks of others. Terms of use IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only.additional terms of use are located at Terms of use For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page IBM United States Software Announcement IBM is a registered trademark of International Business Machines Corporation 14

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications

IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications IBM United States Software Announcement 215-480, dated December 15, 2015 IBM Kenexa Lead Manager can help you source top talent, build strong relationships and generate qualified applications Table of

More information

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages IBM United States Software Announcement 215-492, dated October 27, 2015 adds enterprise packages and offers new capabilities for all packages Table of contents 1 Overview 6 Publications 2 Key prerequisites

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

IBM United States Software Announcement 215-403, dated October 27, 2015

IBM United States Software Announcement 215-403, dated October 27, 2015 IBM United States Software Announcement 215-403, dated October 27, 2015 IBM Performance Management on Cloud adds a new offering, IBM Website Monitoring on Cloud, as well as new capabilities that extend

More information

AnceroAir Mobile Device Management (MDM) Service Guide

AnceroAir Mobile Device Management (MDM) Service Guide AnceroAir Mobile Device Management (MDM) Service Guide Contents Service Overview... 3 Core Mobile Device Management... 3 Mobility Management Bundle... 3 Secure Productivity Suite... 4 TouchDown (with Exchange

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

IBM MobileFirst Protect: Secure & Manage your mobile enterprise IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

6 Things To Think About Before Implementing BYOD

6 Things To Think About Before Implementing BYOD 6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

IBM Payments Gateway extends the IBM Financial Transaction Manager product family to offer consumer payments on a cloud platform

IBM Payments Gateway extends the IBM Financial Transaction Manager product family to offer consumer payments on a cloud platform IBM United States Software Announcement 215-139, dated April 14, 2015 IBM Payments Gateway extends the IBM Financial Transaction Manager product family to offer consumer payments on a cloud platform Table

More information

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

McAfee Enterprise Mobility Management (McAfee EMM ) 12.0

McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Managing Mobility in the BYOD Era:

Managing Mobility in the BYOD Era: Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in

More information

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Xperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment.

Xperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment. Xperia TM in Business Enterprise Mobility Management Read about how Xperia devices can be administered in a corporate IT environment April 2016 About this document Products covered This document describes

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

M a as3 6 0 fo r M o bile D evice s

M a as3 6 0 fo r M o bile D evice s by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile

More information

Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Mobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015. Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

IBM Algo One Managed Data Service on Cloud programs deliver data and analytical solutions for risk management

IBM Algo One Managed Data Service on Cloud programs deliver data and analytical solutions for risk management Announcement ZP14-0256, dated April 29, 2014 IBM Algo One Managed Data Service on Cloud programs deliver data and analytical solutions for risk management Table of contents 1 Overview 5 Technical information

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information