Boost Fertility New Invention Ups Success Rates.pdf
IBM MaaS360 with Watson
1. 1 IBM Security
A cognitive approach to enable endpoints,
end users and everything in between.
2. 2 IBM Security
Traditional mobile device
management solutions were
built for a simpler time.
Today’s IT leaders
have bigger ambitions.
3. 3 IBM Security
Cognitive technology gives IT and
security leaders the power to see:
• What happened
• What can happen
• What should be done
All in the context of your environment.
4. 4 IBM Security
IBM MaaS360 with Watson offers a new approach.
• Digging through news & blogs randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best practices ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
5. 5 IBM Security
Senior Product Manager, Enterprise Mobility
There is enormous potential in unified
endpoint management when you
incorporate cognitive technology like
Watson into MaaS360.
With this capability, we are able to get an
in-depth feel of our device landscape
instantly helping us make decisions faster
as to where we need to evolve the platform.
BRIAN JACOME
6. 6 IBM Security
Unified Endpoint Management (UEM)
is the first step to enable today’s enterprise ecosystem.
Devices and things People and identity Apps and content
7. 7 IBM Security
Traditional client management Modern API management+
Technology convergence is changing the game.
8. 8 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Augmented intelligence and cognitive computing
Actionable insights Contextual analytics
Apps and content People and identity
Apps Content Data Identity Threats Connectivity
Devices and things
Smartphones Tablets Laptops Wearables Internet of Things
9. 9 IBM Security
• Box App for UEM
̶ Pre-integrated with Box APIs
̶ Preserves the native Box app experience
̶ Controls access to content based on a user’s role or device security posture
̶ Includes user authentication, open-in restrictions, selective wipe and blocking user access
• Direct integration with IBM MaaS360 Container App
̶ Consolidates view of content repositories needed for work
̶ Enforces policies to ensure data is secure
̶ Includes user authentication, copy/paste restrictions and open-in to only authorized apps
IBM MaaS360 with Watson + Box enable access and security of content
10. 10 IBM Security
Do more than manage endpoints.
Transform your
business with
Editor's Notes
Let me start with our point of view at IBM as it relates to mobile.
Our mission is to enable apps and content with trust on any device, anytime, and anywhere.
We do that by delivering secure mobile enablement for the way people work and collaborate with colleagues and customers.
To us, secure enterprise mobility is about supporting the user’s expectations of being able to work remotely while having the flexibility to use the devices and apps of their choice.
We execute on this by delivering IT and security pros the capabilities they need to:
Extend mobile to new areas of the organization and use cases
Provide end-to-end mobile security across devices, apps, content and users
Combine mobile management with IT tools to build and deploy mobile apps at scale
Reduce the cost and complexity of managing mobile assets
Ensure compliance with policies and industry regulations
With 6,000 mobile experts and more than 4,300 patents secured in mobile, social and security, IBM’s commitment to mobile is unmatched in the industry. These resources have been incorporated into solutions that enable enterprise clients to radically streamline and accelerate mobile adoption—helping organizations engage more people and capture new markets every day.
Takeaway: IT Leaders can’t rely on tools that provide basic mobility management, while drowning in a sea of information, data and threats.
IT Leaders once depended on mobile device management (MDM). Even as IT Leaders move onto different types of management systems, such as enterprise mobility management (EMM), businesses continue to have a limited view of their mobile, network, cloud and data center domains.
IT Leaders are awash in massive amounts of events and data across each domain, moving among the cloud, devices, apps and content. Apps are being developed and introduced at a rapid pace and with limited security best practices. Malware is becoming more prevalent and growing in frequency on mobile. At the same time, IT Leaders must meet compliance requirements in an increasingly regulated environment.
To deliver a more unified security and management system that gives their team the flexibility they demand, IT Leaders need a better and smarter approach.
Takeaway: The right platform can give IT Leaders the power to unleash their business’s potential.
Enterprise digitalization will grant IT Leaders a distinctive vantage point, spanning infrastructure, business processes and intelligence. The IT Leaders of the future will be trained to optimize business processes to remain competitive. They will rely on security intelligence that can understand, reason and learn from human interactions with mobile technology. They will apply behavioral patterns detected by security intelligence to inform decisions about enterprise technology systems. And they will be open to change—so long as it’s rooted in solid, tested patterns. Cognitive capabilities will be part of the transformation because it can improve IT Leaders’ efficiency and insights by providing contextual best practices, productivity improvement opportunities and emerging threat alerts.
Analogy => paper map to a fully connected GPS device
Daily commute => Start your trip => multiple ways to get to work
What happened => traffic incident
What can happen => get stuck in X mins of traffic
What should be done => Re-route to an alternative route
Context => Where you are, how far you are from the incident, what other streets or exits are nearby
Takeaway: IBM MaaS360 with Watson delivers insights and analytics to make it faster, easier and more effective to manage and secure endpoints – and their apps, data and content.
MaaS360 with Watson provides insights and recommendations that empower you to:
Discover best practices for user productivity, recommendations for IT optimization and potential security threats—delivered right to your MaaS360 dashboard
Define what the insight is and why it is important for your organization
Assess the impact of best practices or security risks to your devices, users, applications and more
Act on the intelligence to unlock business opportunities or remediate security threats
MaaS360 with Watson technology (examples/use cases):
Detects malware on a specific version of an app, operating system or device
Offers a link to resources such as security blogs, forums and tweets
Tells you how many endpoints within your network are affected by new threats
Offers suggestions for actions, such as "Block usage of XYZ app until the user updates to the latest version”
Provides actionable insights for improved productivity and protection
Offers context-driven best practices and recommendations
All this allows you to:
Improve user convenience by identifying productivity, policy and app opportunities
Safeguard enterprise mobility by automatically discovering security vulnerabilities found in the marketplace
Discover avenues of security improvement based on peer benchmarks and best practices
Increase IT efficiency with automated delivery of contextual insights and recommendations
Takeaway: Unified endpoint management (UEM) offers a comprehensive, highly secure platform that manages and protects Devices and Things (smartphones, tablets, laptops, desktops, wearables and IoT), People and Identity (authentication, authorization, Single Sign On, secure use access, and Apps and Content.
UEM redefines user devices as endpoints and centralizes the management of those endpoints into a single application suite. UEM identifies malware and infected devices, wipes data from lost or stolen devices, gives employees the best apps to get their jobs done faster and more securely, flags outdated apps and sends updates over the air.
But UEM is much more than allowing or denying access to network resources; it’s single sign-on management, user management, device management, device health checks, update management, resource management, device security, access control and app delivery.
Using a UEM solution can transform your business by keeping your network resources and your business assets more secure while still providing the freedom your users need to creatively solve business problems with as few roadblocks as possible.
However, with the exponential increase in endpoints, and the data from those devices and things, IT Leaders and their teams will be more challenged than ever to adequately manage and secure their users and data. The overwhelming amount of information and data requires a new and smarter approach to empower your team be more efficient, enable your employees to be more productive and help your corporate data to be more secure. UEM is just the first step to digital business transformation.
Takeaway: Unified endpoint management (UEM) offers a comprehensive, highly secure platform that manages and protects Devices and Things (smartphones, tablets, laptops, desktops, wearables and IoT), People and Identity (authentication, authorization, Single Sign On, secure use access, and Apps and Content.
UEM redefines user devices as endpoints and centralizes the management of those endpoints into a single application suite. UEM identifies malware and infected devices, wipes data from lost or stolen devices, gives employees the best apps to get their jobs done faster and more securely, flags outdated apps and sends updates over the air.
But UEM is much more than allowing or denying access to network resources; it’s single sign-on management, user management, device management, device health checks, update management, resource management, device security, access control and app delivery.
Using a UEM solution can transform your business by keeping your network resources and your business assets more secure while still providing the freedom your users need to creatively solve business problems with as few roadblocks as possible.
However, with the exponential increase in endpoints, and the data from those devices and things, IT Leaders and their teams will be more challenged than ever to adequately manage and secure their users and data. The overwhelming amount of information and data requires a new and smarter approach to empower your team be more efficient, enable your employees to be more productive and help your corporate data to be more secure. UEM is just the first step to digital business transformation.
Takeaway: IBM MaaS360 with Watson technology has unleashed an innovative approach to UEM that does more than manage and protect endpoints, users, applications, content and data.
Cognitive Insights can help organizations accelerate and maximize the return on investment (ROI) from their mobile strategies by:
Identifying and leveraging digital transformation opportunities
Reducing security risks
Increasing the productivity of their workforce
Boosting the efficiency of IT operations
Helping the business make more informed decisions
Cognitive endpoint management:
Improve productivity by identifying policy and app deployment improvements
Be alerted to security vulnerabilities when they are found in the marketplace
Identify areas of security improvement based on peer benchmarks and best practices
App and content management:
Feature-rich productivity suite and container support
Unified enterprise app catalog
Comprehensive app ecosystem aligning CxO, IT, line of business (LOB) and development
Identity authentication:
Simple and seamless access to authorized apps and content
Single-sign-on and conditional access to enterprise resources
Embedded identity provider or third-party integrations
Security-rich and convenient access:
Identify, isolate and remediate advanced threats
Protect connectivity to enterprise resources
Gain dynamic and holistic protection with security intelligence integrations