Top Banner
See How You Measure Up With MaaS360 Mobile Metrics Clint Adams, IBM MaaS360 Offering Management John Harrington, IBM MaaS360 Portfolio Marketing 1/17/2017
12

See How You Measure Up With MaaS360 Mobile Metrics

Apr 14, 2017

Download

Technology

IBM Security
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: See How You Measure Up With MaaS360 Mobile Metrics

See How You Measure Up With MaaS360 Mobile Metrics

Clint Adams, IBM MaaS360 Offering ManagementJohn Harrington, IBM MaaS360 Portfolio Marketing

1/17/2017

Page 2: See How You Measure Up With MaaS360 Mobile Metrics

2 IBM Security

Mobile…

Page 3: See How You Measure Up With MaaS360 Mobile Metrics

3 IBM Security

Page 4: See How You Measure Up With MaaS360 Mobile Metrics

4 IBM Security

Page 5: See How You Measure Up With MaaS360 Mobile Metrics

5 IBM Security

Page 6: See How You Measure Up With MaaS360 Mobile Metrics

6 IBM Security

What is MaaS360 Mobile Metrics?

• See how you compare to the MaaS360 customer community• Benchmark against same vertical and/or similar sized deployments

• Gain actionable intelligence across: • Deployment, Devices, Apps, and Security

A cloud-sourced benchmarking tool for enterprise mobility management

Page 7: See How You Measure Up With MaaS360 Mobile Metrics

7 IBM Security

Mobile Metrics Overview

• Insights surrounding enforcement, usage and compliance

• Best practices for improvement• Compare me feature

Page 8: See How You Measure Up With MaaS360 Mobile Metrics

MaaS360 Mobile Metrics Demo

Page 9: See How You Measure Up With MaaS360 Mobile Metrics

9 IBM Security

Today’s Takeaways

During the device enrollment process:• 74% of devices use a passcode

BYOD Android penetration varies by industry:• 16% in education• 28% in manufacturing

Of employee-owned devices:• 74% are iOS

And the aggregate doesn’t look much different:• 71% of corporate-issued & BYOD are iOS

Unless we’re looking at education, where:• 94% of all devices are iOS

The larger the company, the more thoughtful and complex their policy definitions:

• 55% of 5,000 to 10,000 employee companies have more than 3 iOS policy sets

• 33% have more than 3 for Android• Compared to 15% and 7% across all customers

And when it comes to apps…• Mid-sized companies (250-999 employees)

are concerned with productivity (e.g., Angry Birds)

• While larger companies (5-10K) are concerned with data loss, cloud apps and remote control

Deployment

BYOD

Devices

Policy

Apps

Page 10: See How You Measure Up With MaaS360 Mobile Metrics

10 IBM Security

See How You Measure Up!

• Instantly accessible cloud-sourced benchmarking data

• Additional perspective that improves your organization’s approach to mobile:D̶ Better decision makingD̶ Increased efficiencyD̶ Stronger security

• Your benefits are immediate and on-going

• See how you compare to your peers:D̶ How have they constructed their passcode policy?D̶ What applications do they blacklist or whitelist in my specific industry?D̶ How many iOS devices do they have compared to Android & Windows?

Page 11: See How You Measure Up With MaaS360 Mobile Metrics

Questions?

Page 12: See How You Measure Up With MaaS360 Mobile Metrics

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU