IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist
Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to any device accessing your corporate data regardless of what type it is or whether it s personal or corporate-owned. Any location. Manage and secure every unique device whether it s on or off your corporate network anywhere on the planet. Any time. Get real-time visibility and control of every device on your network. Find and fix problems in minutes before they become major disruptions. 2
Unified Endpoint Smartphones & Tablets Mobile Devices Mobile Apps PC s, Macs, POS, ATMs On and off-network SaaS, On-premise, or MSP Fastest time to compliance Comprehensive Security Lowest TCO Servers Physical and Virtual Patch Lifecycle Power Core Protection Security & Compliance SW Use Analysis Server Automation Find and Fix problems in minutes across all endpoints, on or off the network Add new capabilities in minutes without additional resources or infrastructure Mobile 3
Endpoint Manager Family Product Packaging & Capabilities Lifecycle TADd / ILMT convergence Datacenters Security & Compliance 4 Software Distribution Server Automation (add-on) Patch Basic HW & SW Inventory OS Deployment Remote Control TPM evolution Available as Starter Kit Advanced Server & Task Automation Physical & Virtual Server Middleware Software Use Analysis Power Software Inventory Software Usage Reporting Software Catalog Correlation Windows & Macs Carbon, cost reduction reports End-user Dashboard OS & App Patching Basic HW & SW Inventory Software Distribution OS Deployment Remote Control Security Config Mgmnt Vulnerability Assessment Compliance Analytics 3 rd Party Endpoint Protection Mgmnt Self-Quarantine OS Patching Application Patching Offline Patching Mobile Device Mgmt App Mgmt Compliance Patch Mobile Devices Available as Starter Kit Patch Security Config Mgmnt Vulnerability Assessment Compliance Analytics 3 rd Party Endpoint Protection Mgmnt Self-Quarantine Anti Virus/ Malware Core Protection Firewall Data Loss Prevention & Device Control (Data Protection add-on)
5 IBM Security Lifecycle Services Asset Discovery Patch Inventory Software Distribution OS Deployment Remote Desktop Control Patch Services IBM Cloud content delivery service (operating systems and 3rd party applications) Patch capabilities for multiple platforms: Windows, Mac OS X, Linux and UNIX Intelligent agent Benefits Role based software deployment and user selfprovisioning Hardware independent OS imaging and driver management Dramatically reduced patch cycles and increased first-pass success rates Multi-platform support from a single console (Unix, Linux, Windows, Mac OS X) Benefits Reduction in patch and update times from weeks and days to hours and minutes Increase first-pass success rates from 60-75% to 95-99+% Real-time reporting Automated self-assessment, no centralised or remote scanning required Software Usage Analysis Services For Windows Servers, PCs, Unix/Linux Servers Software Asset Discovery Software Use Metering /Reporting Software catalogue, which contains over 105,000 signatures out of the box and updates are released regularly + Easily customize the software identification catalogue to include tracking of home-grown and proprietary applications Benefits Centralised visibility & reporting of all sw assets Assess software inventory to help identify what is deployed in readiness for software audits Meters software usage to identify unused software Reports software usage and deployments to help measure compliance
Security and Compliance Services Asset Discovery and Visibility Patch Security Configuration Multi-Vendor Anti-Malware Vulnerability Network Self Quarantine Server Automation Services Benefits Continuous enforcement of security policies, regardless of network connection status Host-based vulnerability assessment with severity scoring and a 99.9% accuracy rate Define and assess client compliance to security configuration baselines SCAP certified for FDCC Windows, UNIX, Linux, and Mac OS X Benefits Core Protection Services Prevents viruses, Trojans, worms, and other new malware, catches and cleans spyware, rootkits and remnants completely Deep-cleans malware with Trend Micro SysClean Enterprise client firewall for network safety and blocks users and applications from malicious web content Integrates Web Reputation and File Reputation services powered by the Trend Micro Smart Protection Network Data Loss Prevention and Advanced Device Control Benefits 6 Task Sequencing Advanced Server Patching support Coordinated Server Builds (OS through Middleware) Middleware Reduce tools required to manage distributed and datacenter servers Automate lifecycle management of both physical and virtual servers. Enables users to perform advanced automation tasks across servers - without the need for programming skills Out of the box automation and simple customization Reduce hardware and administration costs with a single console, server, and agent infrastructure that management of both systems and security functions across multiple platforms. Protect return on existing investments through decreased infection rates, VDI-awareness, and an increased useful life of PCs due to a significantly smaller client footprint Realize faster time-to-value enables easy activation of additional capabilities with no infrastructure modification required
IBM Endpoint Manager elements Single intelligent agent Continuous self-assessment Continuous policy enforcement Minimal system impact (<2% CPU, <10MB RAM) Single server and console Highly secure, highly available Aggregates data, analyzes and reports Manages up to 250K endpoints per server Flexible policy language (Fixlets) Thousands of out-of-the-box policies Best practices for operations and security Simple custom policy authoring Highly extensible/applicable across all platforms Lightweight, easily configurable infrastructure Designate IBM Endpoint Manager agent as a relay or discovery point in minutes Provides built-in redundancy Leverages existing systems/shared infrastructure 7 2013 IBM Corporation
Smarter Prevention on the Network and Endpoint to Break the Chain 1 Smarter Prevention 2 Security Intelligence Continuous Response 3 Trusteer Apex Endpoint Exploit Chain Disruption Java Lockdown Protection - granular control of untrusted code, cloud-based file inspection, and QRadar integration IBM Endpoint Manager and QRadar QRadar and IEM detect and prioritize vulnerabilities; IEM remediates issues before exploits can occur IBM Security QRadar Security Intelligence Real-time correlation of security and threat information; integration with Trusteer, IEM and 100s of other security products IBM Security QRadar Incident Forensics Integrated forensics module with full packet search, session reconstruction and visual relationship correlation IBM Endpoint Manager Automatic quarantine of exploited endpoints; custom remediation and patching of affected machines 5 Open Integrations Global Threat Intelligence 4 Ready for IBM Security Intelligence Ecosystem New functionality from partners including FireEye, TrendMicro, Damballa and other protection vendors IBM X-Force Threat Intelligence NEW New real-time sharing of Trusteer threat intelligence from 100M+ endpoints with X-Force 8
IBM Security Integrated capabilities delivered across a comprehensive security framework The IBM Security Framework Strategy, Risk and Compliance Detect, analyze, and prioritize threats QRadar Reduce fraud and malware Manage users and their access Trusteer and IBM Endpoint Manager Identity and Access Discover, protect and remediate endpoints IBM Endpoint Manager Secure critical business applications AppScan Protect infrastructure against attacks XGS and Apex Monitor and evaluate today s threats IBM X-Force 9 Managed, Cloud, and Professional Services
10
11
Basic Type of deployment 12
IBM Endpoint Manager, built on BigFix technology 13