IBM Endpoint Manager Product Introduction and Overview

Similar documents
w w w w w..a A K K TIO TIO..com com

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Ironside Group Solutions

IBM Tivoli Endpoint Manager for Security and Compliance

Do not forget the basics!!!!!

IBM Tivoli Endpoint Manager for Security and Compliance

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

Reducing the cost and complexity of endpoint management

IBM Endpoint Manager for Core Protection

Malware and Other Malicious Threats

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management

QRadar SIEM and FireEye MPS Integration

Endpoint protection for physical and virtual desktops

Hope is not a strategy. Jérôme Bei

Safeguarding the cloud with IBM Dynamic Cloud Security

What is Security Intelligence?

Simplify security management in the cloud

Symantec Endpoint Protection

Under the Hood of the IBM Threat Protection System

BIGFIX. Software Distribution for a Distributed World

Cisco Advanced Malware Protection for Endpoints

Endpoint protection for physical and virtual desktops

Q1 Labs Corporate Overview

IBM Endpoint Manager and MaaS360 Overview Presentation

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

IBM QRadar Security Intelligence April 2013

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Total Defense Endpoint Premium r12

End-user Security Analytics Strengthens Protection with ArcSight

IBM Endpoint Manager for Server Automation

Symantec IT Management Suite 7.5 powered by Altiris

IBM Security IBM Corporation IBM Corporation

How to Choose the Right Security Information and Event Management (SIEM) Solution

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

Leverage security intelligence for retail organizations

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Altiris IT Management Suite 7.1 from Symantec

Information Technology Solutions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Symantec Endpoint Protection

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

IBM Software Choosing the right virtualization security solution

Bringing Continuous Security to the Global Enterprise

How To Protect Your Cloud From Attack

ESET Security Solutions for Your Business

24/7 Visibility into Advanced Malware on Networks and Endpoints

Unified Security, ATP and more

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

How To Monitor Your Entire It Environment

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

IBM Security Intelligence Strategy

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Patch Management SoftwareTechnical Specs

Cisco Advanced Malware Protection for Endpoints

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Microsoft Windows Intune: Cloud-based solution

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

6 Things To Think About Before Implementing BYOD

Netzwerkvirtualisierung? Aber mit Sicherheit!

Bitdefender GravityZone Sales Presentation

OVERVIEW. Enterprise Security Solutions

Symantec Client Management Suite 8.0

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Devising a Server Protection Strategy with Trend Micro

REVOLUTIONIZING ADVANCED THREAT PROTECTION

overview Enterprise Security Solutions

Vulnerability Management

Altiris IT Management Suite 7.1 from Symantec

Dynamic Service Desk. Unified IT Management. Solution Overview

The Benefits of an Integrated Approach to Security in the Cloud

Security Intelligence

IBM Security Systems Solutions

Altiris Server Management Suite 7.1 from Symantec

Sophos Cloud and Partner Dashboard Jonathan Shaw

Proven LANDesk Solutions

Cisco Advanced Malware Protection

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

IBM Security QRadar Vulnerability Manager

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Leveraging security from the cloud

IT Operations Management. Intelligent. Integrated. Innovative.

Windows Server 2003 End of Support. What does it mean? What are my options?

DOBUS And SBL Cloud Services Brochure

Vulnerability Management for the Distributed Enterprise. The Integration Challenge

The Current State of Cyber Security

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Secure Your Mobile Workplace

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

End to End Security do Endpoint ao Datacenter

IBM QRadar as a Service

Symantec Endpoint Protection Datasheet

Transcription:

IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist

Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to any device accessing your corporate data regardless of what type it is or whether it s personal or corporate-owned. Any location. Manage and secure every unique device whether it s on or off your corporate network anywhere on the planet. Any time. Get real-time visibility and control of every device on your network. Find and fix problems in minutes before they become major disruptions. 2

Unified Endpoint Smartphones & Tablets Mobile Devices Mobile Apps PC s, Macs, POS, ATMs On and off-network SaaS, On-premise, or MSP Fastest time to compliance Comprehensive Security Lowest TCO Servers Physical and Virtual Patch Lifecycle Power Core Protection Security & Compliance SW Use Analysis Server Automation Find and Fix problems in minutes across all endpoints, on or off the network Add new capabilities in minutes without additional resources or infrastructure Mobile 3

Endpoint Manager Family Product Packaging & Capabilities Lifecycle TADd / ILMT convergence Datacenters Security & Compliance 4 Software Distribution Server Automation (add-on) Patch Basic HW & SW Inventory OS Deployment Remote Control TPM evolution Available as Starter Kit Advanced Server & Task Automation Physical & Virtual Server Middleware Software Use Analysis Power Software Inventory Software Usage Reporting Software Catalog Correlation Windows & Macs Carbon, cost reduction reports End-user Dashboard OS & App Patching Basic HW & SW Inventory Software Distribution OS Deployment Remote Control Security Config Mgmnt Vulnerability Assessment Compliance Analytics 3 rd Party Endpoint Protection Mgmnt Self-Quarantine OS Patching Application Patching Offline Patching Mobile Device Mgmt App Mgmt Compliance Patch Mobile Devices Available as Starter Kit Patch Security Config Mgmnt Vulnerability Assessment Compliance Analytics 3 rd Party Endpoint Protection Mgmnt Self-Quarantine Anti Virus/ Malware Core Protection Firewall Data Loss Prevention & Device Control (Data Protection add-on)

5 IBM Security Lifecycle Services Asset Discovery Patch Inventory Software Distribution OS Deployment Remote Desktop Control Patch Services IBM Cloud content delivery service (operating systems and 3rd party applications) Patch capabilities for multiple platforms: Windows, Mac OS X, Linux and UNIX Intelligent agent Benefits Role based software deployment and user selfprovisioning Hardware independent OS imaging and driver management Dramatically reduced patch cycles and increased first-pass success rates Multi-platform support from a single console (Unix, Linux, Windows, Mac OS X) Benefits Reduction in patch and update times from weeks and days to hours and minutes Increase first-pass success rates from 60-75% to 95-99+% Real-time reporting Automated self-assessment, no centralised or remote scanning required Software Usage Analysis Services For Windows Servers, PCs, Unix/Linux Servers Software Asset Discovery Software Use Metering /Reporting Software catalogue, which contains over 105,000 signatures out of the box and updates are released regularly + Easily customize the software identification catalogue to include tracking of home-grown and proprietary applications Benefits Centralised visibility & reporting of all sw assets Assess software inventory to help identify what is deployed in readiness for software audits Meters software usage to identify unused software Reports software usage and deployments to help measure compliance

Security and Compliance Services Asset Discovery and Visibility Patch Security Configuration Multi-Vendor Anti-Malware Vulnerability Network Self Quarantine Server Automation Services Benefits Continuous enforcement of security policies, regardless of network connection status Host-based vulnerability assessment with severity scoring and a 99.9% accuracy rate Define and assess client compliance to security configuration baselines SCAP certified for FDCC Windows, UNIX, Linux, and Mac OS X Benefits Core Protection Services Prevents viruses, Trojans, worms, and other new malware, catches and cleans spyware, rootkits and remnants completely Deep-cleans malware with Trend Micro SysClean Enterprise client firewall for network safety and blocks users and applications from malicious web content Integrates Web Reputation and File Reputation services powered by the Trend Micro Smart Protection Network Data Loss Prevention and Advanced Device Control Benefits 6 Task Sequencing Advanced Server Patching support Coordinated Server Builds (OS through Middleware) Middleware Reduce tools required to manage distributed and datacenter servers Automate lifecycle management of both physical and virtual servers. Enables users to perform advanced automation tasks across servers - without the need for programming skills Out of the box automation and simple customization Reduce hardware and administration costs with a single console, server, and agent infrastructure that management of both systems and security functions across multiple platforms. Protect return on existing investments through decreased infection rates, VDI-awareness, and an increased useful life of PCs due to a significantly smaller client footprint Realize faster time-to-value enables easy activation of additional capabilities with no infrastructure modification required

IBM Endpoint Manager elements Single intelligent agent Continuous self-assessment Continuous policy enforcement Minimal system impact (<2% CPU, <10MB RAM) Single server and console Highly secure, highly available Aggregates data, analyzes and reports Manages up to 250K endpoints per server Flexible policy language (Fixlets) Thousands of out-of-the-box policies Best practices for operations and security Simple custom policy authoring Highly extensible/applicable across all platforms Lightweight, easily configurable infrastructure Designate IBM Endpoint Manager agent as a relay or discovery point in minutes Provides built-in redundancy Leverages existing systems/shared infrastructure 7 2013 IBM Corporation

Smarter Prevention on the Network and Endpoint to Break the Chain 1 Smarter Prevention 2 Security Intelligence Continuous Response 3 Trusteer Apex Endpoint Exploit Chain Disruption Java Lockdown Protection - granular control of untrusted code, cloud-based file inspection, and QRadar integration IBM Endpoint Manager and QRadar QRadar and IEM detect and prioritize vulnerabilities; IEM remediates issues before exploits can occur IBM Security QRadar Security Intelligence Real-time correlation of security and threat information; integration with Trusteer, IEM and 100s of other security products IBM Security QRadar Incident Forensics Integrated forensics module with full packet search, session reconstruction and visual relationship correlation IBM Endpoint Manager Automatic quarantine of exploited endpoints; custom remediation and patching of affected machines 5 Open Integrations Global Threat Intelligence 4 Ready for IBM Security Intelligence Ecosystem New functionality from partners including FireEye, TrendMicro, Damballa and other protection vendors IBM X-Force Threat Intelligence NEW New real-time sharing of Trusteer threat intelligence from 100M+ endpoints with X-Force 8

IBM Security Integrated capabilities delivered across a comprehensive security framework The IBM Security Framework Strategy, Risk and Compliance Detect, analyze, and prioritize threats QRadar Reduce fraud and malware Manage users and their access Trusteer and IBM Endpoint Manager Identity and Access Discover, protect and remediate endpoints IBM Endpoint Manager Secure critical business applications AppScan Protect infrastructure against attacks XGS and Apex Monitor and evaluate today s threats IBM X-Force 9 Managed, Cloud, and Professional Services

10

11

Basic Type of deployment 12

IBM Endpoint Manager, built on BigFix technology 13