Mobile Device Management: Security and Productivity with a Competitive Edge

Post on 13-Apr-2017

811 Views

Category:

Mobile

0 Downloads

Preview:

Click to see full reader

Transcript

The Mobility Management Advantage:

Management, Security and Productivity with a Competitive Edge

Housekeeping items

Duration – 60 minutesSubmit your questions to all

panelists in the Q&A box located on the right-hand side of your screen

Section A

Use Policy, Productivity, Collaboration, Device

Management, and Security

Securely enable apps and contenton any device, anytime, anywhere

Frank Picarello
Add "Securely"

Presenters:Rob GrundlockRaymond MorrisChewie Wang

Mobilechanges the way

people work

Mobileprovides a better

experience

Mobile creates risk to company data

Mobile is Strategic for Business

What Businesses are Asking

“How do I ensure all devices accessing our network are secured and encrypted?”

“How do I enable my workforce with the right apps and user experience at the right time?”

Maximize Productivity Amplify Protection

“How do I manage the rapid deployment of devices in a cost-effective way?”

“How do I tie in to all my existing systems? I need to protect my investment!”

“How do I ensure authorized access to customer data and protect against threats?”

“How do I show that we are compliant with our policies and industry regulations?”

AND

Business 1 Business 2

Mobile is complex and challenging to manage

Mobilemixes personal

and work

Mobilelives outside

your perimeter

Mobileis fast-paced and

multi-platform

Mobile Trends

8

by 2017Mobile downloadswill increase to

268 billionGartner

by 2016The number of smartphone users worldwide will surpass

2 billioneMarketer

75%of mobile security breaches occur via appsGartner

Arxan

Top mobile devicesand apps hacked 97%

Android

87%iOS

Perennial EMM Market Leader

9

“IBM’s complete portfolio paired with a strong partner and services organization gives it the breadth to tackle most customer challenges.”The Forrester Wave™: Enterprise Mobile Management, Q4 2015

“IBM's mature shared-processing multitenant architecture is the best-in-class cloud among ranked EMM vendors.”Gartner Magic Quadrant for Enterprise Mobility Management Suites 2015

Awareness is Top Priority even in 2016

Increasing threat to Healthcare and Government

More complex threats through malware, apps, and breaches

Need for security is growing

The Value of Effectively Managing a Mobile Device

• Manage and control devices in your network• Dual persona

Access corporate information Not personal information

Balance of Security & Productivity

Case StudiesMobile Security

A healthcare provider

Protects their mobile devices

ensuring HIPAA compliance; installed and integrated

with existing servers in just

90 minutes

IBM MaaS360

Mobile Productivity

A gaming andentertainment company

reduces customer wait time by

80%with tabletsusing a single

managed app to speedthe time to deliver foodand drinks to customers

IBM MaaS360

Complete Mobility Management and Security

Secure Document SharingContent Collaboration

Mobile Threat ManagementMalware Protection

Mobile Enterprise GatewayEnterprise Access

Advanced ManagementVisibility & Control

Secure Productivity Suite Trusted Workplace

Seamless Integration

Advanced ManagementVisibility & Control

Secure Productivity Suite Trusted Workplace

Secure Document SharingContent Collaboration

Mobile Threat ManagementMalware Protection

Mobile Enterprise GatewayEnterprise Access

BYODCorporate

Shared

Mail SystemsDirectoriesCertificatesFile share

TeamLogic IT’s Complete Mobile Device Management

Integratedsolutions that connect seamlessly to your existing and external environments

Scalabledata security with intelligence for the volume, speed, and variability of mobile

Completemanagement of devices, apps, content and users from a single platform

Use PolicyStarts with an Acceptable Use Policy for Mobile Devices whether company issued or BYOD

Get Started Now

Use PolicyDevelop a “Use Policy” that aligns to your HR practices and business goals

ManagementManage and secure your devices, apps and content without inhibiting business productivity and effectiveness

Define and AlignDetermine the appropriate technology and services to align and support your policy

1 2 3

Thank You!

top related