SlideShare ist ein Scribd-Unternehmen logo
1 von 20
© IBM Svenska AB
Stefan Korsbacken
Nordic Sales Manager
TEM
korsbacken@se.ibm.com
Today’s Endpoint Management
                     Challenges Drive IT Costs Up                                              Virtualization technology
                                                    More than 50% of end users                 usage continues to grow
                                                       change their security                       rapidly; increasing
                                                             settings                          management challenges
Endpoint Management Cost




                           Up to 95% of the workforce are
                            mobile; connectivity is often
                            inconsistent and unreliable




                                                                                       Most enterprises need several OS to run their
                                                                                            business; requiring multiple tools,
                                                                                          infrastructures & breadth of expertise




                                                            Confidentiality, integrity and availability needs
                                                            to be proven – for all endpoints, everywhere


                                                       Endpoint Management Complexity
Bigfix, The Power of One
BigFix: A Visionary in PC Lifecycle Management
    and EndPoint Protection
         “BigFix is an excellent choice for organizations that are looking for very robust management of
     endpoints, integration of PCLCM capabilities, and the ability to manage endpoint security technologies
     PC Lifecycle Management Magic Quadrant from multiple vendors”


                                                             According to Gartner:

                                                             • “offers strong endpoint
                                                               protection security
                                                               configuration assessment
                                                               capabilities, as well as tight
                                                               integration among various
   “has a strong reputation for its software distribution
                                                               modules through the BigFix
           and patch management capabilities”                  Platform.”
   “receives high marks from customers on its ability to
          scale and its efficient use of bandwidth.”

                                                                                                          4
Using Tivoli Endpoint Manager, Administrators can:
• See all endpoints: physical, virtual, fixed or mobile
• Fix issues anywhere in minutes, regardless of bandwidth or
  connectivity
• Deploy in days, over any network or geography
• Achieve continuous compliance – across platforms
• Simplify operations and enjoy rapid time to value
IBM Tivoli Endpoint Manager for Lifecycle
            Management
            A single-agent, single-console approach for endpoint
            management across the enterprise


• Asset discovery and inventory to create dynamic situational
  awareness
• Software distribution with policy-based installation and closed-loop
  verification
• Simplify operating system deployment for new workstations,
  laptops and servers throughout the network as well as OS
  migration and refresh for existing endpoints
• Manage heterogeneous platforms—Microsoft® Windows®,
  UNIX®, Linux® and Mac operating systems running on physical or
  virtual machines
IBM Tivoli Endpoint Manager for Security and
            Compliance
            A single solution for managing endpoint security across
            the organization


• Continuous enforcement of security configurations and patches
• Centralized management of third-party anti-malware and firewall
  protection
• Out-of-box best practices to help meet regulations
• Trending and analysis of security changes through advanced
  reporting
• Discover endpoints that organizations may not be aware of in their
  environment
IBM Tivoli Endpoint Manager for Patch Management
             Continuous patch compliance visibility and enforcement




•Automatically manage patches for multiple operating systems and
applications
•Reduce security and compliance risk by slashing remediation cycles
from weeks to days or hours
•Gain greater visibility into patch compliance with flexible, real-time
monitoring and reporting
•Apply only the correct patches to the correct endpoint
IBM Tivoli Endpoint Manager for Power Management
             Full-spectrum, flexible power management made simple




•   Control energy costs with a centralized, scalable, policy-driven
    power management system for endpoints
•   Manage power settings for endpoints, regardless of location,
    connection type or status
•   Empower end users with an opt-in approach that allows them to
    select their power profile
•   Apply out-of-the-box capabilities to deal with common power
    management issues
Using Tivoli Endpoint Manager, Administrators can:
• See all endpoints: physical, virtual, fixed or mobile
• Fix issues anywhere in minutes, regardless of bandwidth or
  connectivity
• Deploy in days, over any network or geography
• Achieve continuous compliance – across platforms
• Simplify operations and enjoy rapid time to value
11




TEM is Strategic for IBM and Tivoli
• TEM is Tivoli’s Strategic solution for Endpoint Management and Security
  Configuration Management

• TEM will replace products such as Tivoli Configuration Manager, Tivoli
  Provisioning Manager for Software and Tivoli Security Compliance
  Manager
  – TEM does NOT replace Tivoli Provisioning Manager, our premier Data Center
    Automation solution
• TEM will become the Platform and shipping offering for an updated
  version of Proventia Desktop

• TEM content is being investigated for integration with other Tivoli and
  IBM products including Tivoli Provisioning Manager and IBM Systems
  Director
Mission
 To protect our customers from security threats on the Internet by developing
 a comprehensive knowledge of vulnerabilities and attack methodologies and
 applying that knowledge through effective protection technologies.

                                             IBM X-Force Research and Development

The world’s leading enterprise                                                      Global security operations center
security R&D organization                                                           (infrastructure monitoring)


            Engine                                                                         Content Delivery
• Support content stream needs                                                      • Continue third party testing Dominance
  and capabilities
                                                                                    • Execute to deliver new content streams
• Support requirements for                                                            for new engines
  engine enhancement
• Maintenance and tool development                                                  Industry/Customer Deliverables
                                                                                    • Blog, Marketing and Industry
          Research                                                                    Speaking Engagements
• Support content streams                                                           • X-Force Database
                                                                                      Vulnerability Tracking
• Expand current capabilities in research to
  provide industry knowledge to the greater IBM                                     • Trend Analysis and Security Analytics
BigFix Platform Elements



                                                             Single Server & Console
       Single Intelligent Agent
                                                             • Highly secure, highly available
       • Continuous self-assessment                          • Aggregates data, analyzes & reports
       • Continuous Policy enforcement                       • Manages >250k endpoints
       • Minimal system impact (<2% cpu)
                                                                                       An existing BigFix
                                                                                       managed asset can
                                                                                       become a relay in
                                                                                           minutes



     Powerful policy language (Fixlets)                      Virtual Infrastructure
     • Thousands of out-of-the-box policies
                                                             • Designate any agent a relay or scan point
     • Best practices for ops and security                   • Built-in redundancy
     • Simple custom policy authoring                        • Leverage existing infrastructure
     • Highly extensible / applicable across all platforms


13
The Power of Distributed Intelligence
                                                                   Single Intelligent Agent
                                                                   • Continuous self-assessment
                                                                   • Continuous Policy enforcement
                                                                   • Minimal system impact (<2% cpu)




                                                                   Single Server & Console
                                                                   • Highly secure, highly available
                                                                   • Aggregates data
                                                                   • Analyzes & reports




 Fixlet Messages                    Virtual Infrastructure
 • Out-of-the-box policies          • Designate any BigFix agent
 • Best practices for ops and sec   • Built-in redundancy
 • Simple custom policy authoring   • Leverage existing systems

                                                                             14
Key Trends

• Smartphones have been in the enterprise for many years, though IT
  organizations have historically restricted employees to a limited set
  of supported options

• The availability of mobile devices with high consumer appeal (iOS and
  Android) are changing these dynamics as employees are demanding
  support of a broader range of devices, including employee-owned assets




15         IBM and BP Internal Use Only
Key Trends
 • By 2015, mobile devices are expected to account for 40%
   of all enterprise devices* (2 mobile devices for every 3 PCs
   in the enterprise)
                              2011                      2012             2013                  2014                  2015
         All
      Enterprise
       Mobile                170M                       235M             315M                  413M                  551M
       Devices
          All
      Enterprise             605M                       641M             705M                  766M                  826M
         PCs

 • Hardware improvements in performance and feature set
   are expanding use cases beyond email access to areas
   such as salesforce effectiveness (e.g., corporate apps for
   CRM and expense management)
*Sources: Gartner Forecast: PCs, All Countries (Annual Data) 1Q11; IDC, Worldwide Business Use Smartphone 2010-2014 Forecast, 9/2010; Gartner
Forecast: Connected Mobile Consumer Electronics, Worldwide, 2008-2014, 4Q10 Update
Note: Enterprise devices defined as PCs, smartphones, and media tablets
 16                      IBM and BP Internal Use Only
Tivoli Endpoint Manager (TEM) delivers a
           management solution for all enterprise
           devices
             • Single management platform for servers, desktops,
               laptops, and mobile devices

             • 80+ supported platforms: Windows, Mac OS X, AIX,
               Solaris, Linux, HPUX, VMWare, Windows Mobile*

             • Planned mobile OS support: iOS, Android, Nokia
               Symbian, Windows Phone 7
*   Full agent-based support of Windows Mobile 5.x, 6.0-6.1, Windows CE 4.x, Pocket PC 2003



     17                      IBM and BP Internal Use Only
MDM Functionality Planned for a 3Q 2011
  Beta*
 • Deep device inventory

 • Pin lock password policies

 • Remote wipe

 • Application management

 • Configuration management




* Functionality varies based on mobile OS


  18                      IBM and BP Internal Use Only
TEM Links:
IBM Endpoint Manager - Power Management Module
http://www-01.ibm.com/software/tivoli/products/endpoint-power-mgmt/

IBM Endpoint Manager - The Concept and all moduls
http://www-01.ibm.com/software/tivoli/solutions/endpoint/

IBM Endpoint Manager - Lifecykle Management Module
http://www-01.ibm.com/software/tivoli/products/endpoint-lifecycle-mgmt/

IBM Endpoint Manager - Security and Compliance Module
http://www-01.ibm.com/software/tivoli/products/endpoint-security-compliance/

IBM Endpoint Manager - Patch Management Module
http://www-01.ibm.com/software/tivoli/products/endpoint-patch-mgmt/

Videos about IBM Endpoint Manager (TEM)
http://www.youtube.com/user/ibmservicemanagement#g/c/5DBF0F01676BACE5

Case Studies IBM Endpoint Manager (TEM)
http://www-01.ibm.com/software/tivoli/solutions/endpoint/casestudies/

Support overview IBM Endpoint Manager (TEM)
http://www-947.ibm.com/support/entry/portal/Overview/Software/Tivoli/Tivoli_Endpoint_Manager

Product Information and Documentation IBM Endpoint Manager (TEM)
http://publib.boulder.ibm.com/infocenter/tivihelp/v26r1/index.jsp?topic=/com.ibm.tem.doc/welcome.htm

Introducing IBM Endpoint Manager (TEM)
http://www-01.ibm.com/software/tivoli/beat/02152011.html?cm_sp=MTE16745
Thank you for your time


Tivoli Endpoint Manager
      – Based on BigFix Technologies


Stefan Korsbacken
Nordic Sales Manager

korsbacken@se.ibm.com

Weitere ähnliche Inhalte

Was ist angesagt?

IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationRMayo22
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na   what's new in forefront endpoint protection 2012 betaMct summit na   what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 betaPeter De Tender
 
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...IBM Danmark
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
 
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster RecoveryA Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster Recoveryxmeteorite
 
1.ibm pure flex system mar 2013
1.ibm pure flex system   mar 20131.ibm pure flex system   mar 2013
1.ibm pure flex system mar 2013solarisyougood
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Using ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalUsing ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalLeif Davidsen
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
Application HA in Virtual Environments
Application HA in Virtual EnvironmentsApplication HA in Virtual Environments
Application HA in Virtual EnvironmentsArrow ECS UK
 
Smarter infrastructure with the new IBM Pure Flex System
Smarter infrastructure with the new IBM Pure Flex SystemSmarter infrastructure with the new IBM Pure Flex System
Smarter infrastructure with the new IBM Pure Flex SystemCOMMON Europe
 

Was ist angesagt? (19)

BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentation
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na   what's new in forefront endpoint protection 2012 betaMct summit na   what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta
 
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
PCTY 2012, Overvågning af forretningssystemer i et virtuelt miljø v. Hans Ped...
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster RecoveryA Cost-Effective Integrated Solution for Backup and Disaster Recovery
A Cost-Effective Integrated Solution for Backup and Disaster Recovery
 
1.ibm pure flex system mar 2013
1.ibm pure flex system   mar 20131.ibm pure flex system   mar 2013
1.ibm pure flex system mar 2013
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Using ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments finalUsing ibm mq in managed file transfer environments final
Using ibm mq in managed file transfer environments final
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
Storage Migration Made Simple
Storage Migration Made SimpleStorage Migration Made Simple
Storage Migration Made Simple
 
Application HA in Virtual Environments
Application HA in Virtual EnvironmentsApplication HA in Virtual Environments
Application HA in Virtual Environments
 
Smarter infrastructure with the new IBM Pure Flex System
Smarter infrastructure with the new IBM Pure Flex SystemSmarter infrastructure with the new IBM Pure Flex System
Smarter infrastructure with the new IBM Pure Flex System
 

Ähnlich wie IBM Tivoli Endpoint Manager - PCTY 2011

Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplifiedjohndorian555
 
Cloud-Native Workshop New York- Virtustream
Cloud-Native Workshop New York- VirtustreamCloud-Native Workshop New York- Virtustream
Cloud-Native Workshop New York- VirtustreamVMware Tanzu
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Banking Software Simulated proposal
Banking Software Simulated proposalBanking Software Simulated proposal
Banking Software Simulated proposalImran Fayyaz
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfDNUG e.V.
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureInnoTech
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
 
Arrow ECS Partner Jam - PureSystems - William Burns
Arrow ECS Partner Jam - PureSystems - William BurnsArrow ECS Partner Jam - PureSystems - William Burns
Arrow ECS Partner Jam - PureSystems - William BurnsArrow ECS UK
 
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...IBM Danmark
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherPrecisely
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointHyTrust
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...VMware Tanzu
 

Ähnlich wie IBM Tivoli Endpoint Manager - PCTY 2011 (20)

Managed Hosting
Managed HostingManaged Hosting
Managed Hosting
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplified
 
Cloud-Native Workshop New York- Virtustream
Cloud-Native Workshop New York- VirtustreamCloud-Native Workshop New York- Virtustream
Cloud-Native Workshop New York- Virtustream
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Banking Software Simulated proposal
Banking Software Simulated proposalBanking Software Simulated proposal
Banking Software Simulated proposal
 
BigFix Data Sheet
BigFix Data SheetBigFix Data Sheet
BigFix Data Sheet
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
Why the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and SecureWhy the Cloud can be Compliant and Secure
Why the Cloud can be Compliant and Secure
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
Arrow ECS Partner Jam - PureSystems - William Burns
Arrow ECS Partner Jam - PureSystems - William BurnsArrow ECS Partner Jam - PureSystems - William Burns
Arrow ECS Partner Jam - PureSystems - William Burns
 
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End PointVirtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
Accelerate Rapid Software Innovation with Virtustream Pivotal Cloud Foundry S...
 

Mehr von IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

Mehr von IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Kürzlich hochgeladen

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 

Kürzlich hochgeladen (20)

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 

IBM Tivoli Endpoint Manager - PCTY 2011

  • 1. © IBM Svenska AB Stefan Korsbacken Nordic Sales Manager TEM korsbacken@se.ibm.com
  • 2. Today’s Endpoint Management Challenges Drive IT Costs Up Virtualization technology More than 50% of end users usage continues to grow change their security rapidly; increasing settings management challenges Endpoint Management Cost Up to 95% of the workforce are mobile; connectivity is often inconsistent and unreliable Most enterprises need several OS to run their business; requiring multiple tools, infrastructures & breadth of expertise Confidentiality, integrity and availability needs to be proven – for all endpoints, everywhere Endpoint Management Complexity
  • 4. BigFix: A Visionary in PC Lifecycle Management and EndPoint Protection “BigFix is an excellent choice for organizations that are looking for very robust management of endpoints, integration of PCLCM capabilities, and the ability to manage endpoint security technologies PC Lifecycle Management Magic Quadrant from multiple vendors” According to Gartner: • “offers strong endpoint protection security configuration assessment capabilities, as well as tight integration among various  “has a strong reputation for its software distribution modules through the BigFix and patch management capabilities” Platform.”  “receives high marks from customers on its ability to scale and its efficient use of bandwidth.” 4
  • 5. Using Tivoli Endpoint Manager, Administrators can: • See all endpoints: physical, virtual, fixed or mobile • Fix issues anywhere in minutes, regardless of bandwidth or connectivity • Deploy in days, over any network or geography • Achieve continuous compliance – across platforms • Simplify operations and enjoy rapid time to value
  • 6. IBM Tivoli Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise • Asset discovery and inventory to create dynamic situational awareness • Software distribution with policy-based installation and closed-loop verification • Simplify operating system deployment for new workstations, laptops and servers throughout the network as well as OS migration and refresh for existing endpoints • Manage heterogeneous platforms—Microsoft® Windows®, UNIX®, Linux® and Mac operating systems running on physical or virtual machines
  • 7. IBM Tivoli Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization • Continuous enforcement of security configurations and patches • Centralized management of third-party anti-malware and firewall protection • Out-of-box best practices to help meet regulations • Trending and analysis of security changes through advanced reporting • Discover endpoints that organizations may not be aware of in their environment
  • 8. IBM Tivoli Endpoint Manager for Patch Management Continuous patch compliance visibility and enforcement •Automatically manage patches for multiple operating systems and applications •Reduce security and compliance risk by slashing remediation cycles from weeks to days or hours •Gain greater visibility into patch compliance with flexible, real-time monitoring and reporting •Apply only the correct patches to the correct endpoint
  • 9. IBM Tivoli Endpoint Manager for Power Management Full-spectrum, flexible power management made simple • Control energy costs with a centralized, scalable, policy-driven power management system for endpoints • Manage power settings for endpoints, regardless of location, connection type or status • Empower end users with an opt-in approach that allows them to select their power profile • Apply out-of-the-box capabilities to deal with common power management issues
  • 10. Using Tivoli Endpoint Manager, Administrators can: • See all endpoints: physical, virtual, fixed or mobile • Fix issues anywhere in minutes, regardless of bandwidth or connectivity • Deploy in days, over any network or geography • Achieve continuous compliance – across platforms • Simplify operations and enjoy rapid time to value
  • 11. 11 TEM is Strategic for IBM and Tivoli • TEM is Tivoli’s Strategic solution for Endpoint Management and Security Configuration Management • TEM will replace products such as Tivoli Configuration Manager, Tivoli Provisioning Manager for Software and Tivoli Security Compliance Manager – TEM does NOT replace Tivoli Provisioning Manager, our premier Data Center Automation solution • TEM will become the Platform and shipping offering for an updated version of Proventia Desktop • TEM content is being investigated for integration with other Tivoli and IBM products including Tivoli Provisioning Manager and IBM Systems Director
  • 12. Mission To protect our customers from security threats on the Internet by developing a comprehensive knowledge of vulnerabilities and attack methodologies and applying that knowledge through effective protection technologies. IBM X-Force Research and Development The world’s leading enterprise Global security operations center security R&D organization (infrastructure monitoring) Engine Content Delivery • Support content stream needs • Continue third party testing Dominance and capabilities • Execute to deliver new content streams • Support requirements for for new engines engine enhancement • Maintenance and tool development Industry/Customer Deliverables • Blog, Marketing and Industry Research Speaking Engagements • Support content streams • X-Force Database Vulnerability Tracking • Expand current capabilities in research to provide industry knowledge to the greater IBM • Trend Analysis and Security Analytics
  • 13. BigFix Platform Elements Single Server & Console Single Intelligent Agent • Highly secure, highly available • Continuous self-assessment • Aggregates data, analyzes & reports • Continuous Policy enforcement • Manages >250k endpoints • Minimal system impact (<2% cpu) An existing BigFix managed asset can become a relay in minutes Powerful policy language (Fixlets) Virtual Infrastructure • Thousands of out-of-the-box policies • Designate any agent a relay or scan point • Best practices for ops and security • Built-in redundancy • Simple custom policy authoring • Leverage existing infrastructure • Highly extensible / applicable across all platforms 13
  • 14. The Power of Distributed Intelligence Single Intelligent Agent • Continuous self-assessment • Continuous Policy enforcement • Minimal system impact (<2% cpu) Single Server & Console • Highly secure, highly available • Aggregates data • Analyzes & reports Fixlet Messages Virtual Infrastructure • Out-of-the-box policies • Designate any BigFix agent • Best practices for ops and sec • Built-in redundancy • Simple custom policy authoring • Leverage existing systems 14
  • 15. Key Trends • Smartphones have been in the enterprise for many years, though IT organizations have historically restricted employees to a limited set of supported options • The availability of mobile devices with high consumer appeal (iOS and Android) are changing these dynamics as employees are demanding support of a broader range of devices, including employee-owned assets 15 IBM and BP Internal Use Only
  • 16. Key Trends • By 2015, mobile devices are expected to account for 40% of all enterprise devices* (2 mobile devices for every 3 PCs in the enterprise) 2011 2012 2013 2014 2015 All Enterprise Mobile 170M 235M 315M 413M 551M Devices All Enterprise 605M 641M 705M 766M 826M PCs • Hardware improvements in performance and feature set are expanding use cases beyond email access to areas such as salesforce effectiveness (e.g., corporate apps for CRM and expense management) *Sources: Gartner Forecast: PCs, All Countries (Annual Data) 1Q11; IDC, Worldwide Business Use Smartphone 2010-2014 Forecast, 9/2010; Gartner Forecast: Connected Mobile Consumer Electronics, Worldwide, 2008-2014, 4Q10 Update Note: Enterprise devices defined as PCs, smartphones, and media tablets 16 IBM and BP Internal Use Only
  • 17. Tivoli Endpoint Manager (TEM) delivers a management solution for all enterprise devices • Single management platform for servers, desktops, laptops, and mobile devices • 80+ supported platforms: Windows, Mac OS X, AIX, Solaris, Linux, HPUX, VMWare, Windows Mobile* • Planned mobile OS support: iOS, Android, Nokia Symbian, Windows Phone 7 * Full agent-based support of Windows Mobile 5.x, 6.0-6.1, Windows CE 4.x, Pocket PC 2003 17 IBM and BP Internal Use Only
  • 18. MDM Functionality Planned for a 3Q 2011 Beta* • Deep device inventory • Pin lock password policies • Remote wipe • Application management • Configuration management * Functionality varies based on mobile OS 18 IBM and BP Internal Use Only
  • 19. TEM Links: IBM Endpoint Manager - Power Management Module http://www-01.ibm.com/software/tivoli/products/endpoint-power-mgmt/ IBM Endpoint Manager - The Concept and all moduls http://www-01.ibm.com/software/tivoli/solutions/endpoint/ IBM Endpoint Manager - Lifecykle Management Module http://www-01.ibm.com/software/tivoli/products/endpoint-lifecycle-mgmt/ IBM Endpoint Manager - Security and Compliance Module http://www-01.ibm.com/software/tivoli/products/endpoint-security-compliance/ IBM Endpoint Manager - Patch Management Module http://www-01.ibm.com/software/tivoli/products/endpoint-patch-mgmt/ Videos about IBM Endpoint Manager (TEM) http://www.youtube.com/user/ibmservicemanagement#g/c/5DBF0F01676BACE5 Case Studies IBM Endpoint Manager (TEM) http://www-01.ibm.com/software/tivoli/solutions/endpoint/casestudies/ Support overview IBM Endpoint Manager (TEM) http://www-947.ibm.com/support/entry/portal/Overview/Software/Tivoli/Tivoli_Endpoint_Manager Product Information and Documentation IBM Endpoint Manager (TEM) http://publib.boulder.ibm.com/infocenter/tivihelp/v26r1/index.jsp?topic=/com.ibm.tem.doc/welcome.htm Introducing IBM Endpoint Manager (TEM) http://www-01.ibm.com/software/tivoli/beat/02152011.html?cm_sp=MTE16745
  • 20. Thank you for your time Tivoli Endpoint Manager – Based on BigFix Technologies Stefan Korsbacken Nordic Sales Manager korsbacken@se.ibm.com