SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Expanding the Vision of Enterprise Mobility
Management
Overview of IBM’s planned acquisition of
Fiberlink Communications
Analyst Briefing
November 2013

1

© 2013 IBM Corporation
Agenda
§  Announcing IBM’s intention to acquire
Fiberlink
§  How IBM and Fiberlink will expand the
definition of Enterprise Mobility Management
§  Who is Fiberlink and why Fiberlink
§  Fiberlink customer proof points
§  How IBM and Fiberlink will deliver a
comprehensive Mobility Solution
§  Summary and Analyst Relations contacts

2

© 2013 IBM Corporation
IBM research* identifies four Mobile entry points that all need
effective Management and Security
Create new value at the
moment of awareness

(CxO, LOB Exec)

Connect with
customers in context

Integrate mobile
into the fabric
of the organization

(CMO)

(CIO, CISO, IT Exec)

Develop and run applications

(VP Apps, Developer)
*Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts.
© 2013 IBM Corporation
Read the report at http://ibm.co/ibvmobile
IBM announces the intention to acquire Fiberlink
With Fiberlink, IBM will expand the vision of Enterprise Mobility Management
Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the
ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get
started in just minutes.

v  Extends IBM’s MobileFirst Technology
Platform
ü  An integrated enterprise mobile solution
ü  Eight (8) acquisitions in the last 18 months
ü  Innovative & Evolving (125 patents in 18 months)

v BYOD and Trusted Transactions
ü  Policy-based security
ü  Dual persona and Personal Information
Protection (Container)
ü  Mobile application, content, and document
management
ü  Next generation mobile security with Trusteer
ü  Malware and account take-over detection

v  Comprehensive mobile platform
ü 
ü 
ü 
ü 

Full mobile application lifecycle with Worklight
Unified device management
Seamless integration with enterprise technologies
Advanced and broad mobile OS support

v  Rapid time-to-value
ü  Enroll devices in less than 5 minutes with a SelfService cloud (SaaS Solution)
ü  Simple employee on-boarding capabilities
ü  Manage BYOD and corporate devices
ü  Reduce IT Help Desk dependencies
ü  Scales from 10s of devices to full Enterprise
deployments

ü  Backed by the IBM X-Force Threat Research
Team
4

© 2013 IBM Corporation
Who is Fiberlink?
§  Founded in 1991, Fiberlink has built expertise in delivering mobile
management and security as a service
§  Headquartered in Blue Bell, PA

§  Provides Mobile Device Management, Mobile Application Management,
Enterprise Container with SDK and App-Wrapping, Secure Document
Sharing and Mobile Expense Management as a Service helping enterprises
connect, control and secure mobile devices to gain competitive advantage,
increase employee productivity, and implement proper security measures
§  Industry leading and award winning
§ 
§ 
§ 
§ 

Cloud-based mobility management platform
Seamless integration with existing enterprise systems
Broad range of mobile OS support
Robust policies for Bring Your Own Device (BYOD) security and privacy

§  3500+ clients
§  Marquee financial, healthcare, public sector, education, and retail customers
§  Delivering value to enterprises of all sizes: small to large

5

© 2013 IBM Corporation
Why Fiberlink?
Lotus	
  

Device Management
& Security

AD/LDAP	
  

App Management
& Security

Exchange	
  

Enterprise DLP
& Security

BES	
  
Certs	
  

Simple

Seamless

and fast with an
exceptional experience

integration with
your infrastructure

SaaS implementation provided
100% Day Zero iOS7 support
in every customer environment

Comprehensive corporate
directory and email (On-Prem or
Cloud) integration in under an hour

Proven

approach to cloud
mobility
management
Only FISMA certified
MDM platform.

Comprehensive
layered security

A complete solution to
secure the device, the
app, and the data.

Reduce Management Cost

Improve Security Compliance
& Reduce Risk

Quickly deploy, enroll and
manage devices, apps and
docs with automatic updates
without additional hardware
costs or maintenance hassles.

6

Improve productivity &
employee satisfaction
Provide end-to-end
accessibility so your
employees can truly take the
business wherever they go.

Protect data by enforcing
policies and providing device
and application security on
BYOD and business-issued
devices.

© 2013 IBM Corporation
Fiberlink solutions deliver measureable business results
Desert Schools Federal Credit Union

CDW

Driving Down Costs

Reducing Risk, Improving Employee Satisfaction

Issue: Mobile device management solutions expensive
and difficult to implement.

Issue: Secure Corporate Owned and Employee Owned
Devices

Fiberlink solution provided:

Fiberlink solution provided:

§  Efficient mobile application management, resulting in 92%
time savings for IT

§  Increased employee satisfaction with ability to choose
their own devices

§  50% cost savings through the transfer of device
management responsibilities from Level 2 Engineers to
service desk employees

§  Self-enrollment of new devices by employees in only a few
minutes
§  IT saves 17-35 hours monthly on testing and enrolling
new devices

Eastman Chemical

U.S. Department of Commerce

Securing Mobile Devices

Maintaining Compliance

Issue: Rapid proliferation of unsecured, unmanaged
smartphones and tablet devices had the potential of
compromising sensitive corporate information.

Issue: Difficulty expanding mobile offerings while maintaining
compliance

Fiberlink solution provided:
§  Employee self-service enrollment and end user portal
for help desk functions
§  Ability to securely access corporate networks on popular
devices of their choosing
§  Employees access a catalog of public and private apps
on demand, and are alerted to updates as they occur
7

Fiberlink solution provided:
§  Integrated mobility management capabilities across
devices, apps and documents, delivering a more efficient
and secure infrastructure operations model.
§  Continuous monitoring, automated enforcement and
remediation on any device out of compliance with agency
policies.

© 2013 IBM Corporation
Fiberlink’s Mobile Management and Security Solution will enrich the
IBM MobileFirst Capabilities
Integrating Mobile into the fabric of your organization:
ü  Full application lifecycle to build, run, deploy and manage mobile applications
ü  Embedded security for mobile devices and applications to secure transactions
ü  Manage secure, sensitive data, regardless of the device
ü  Manage, track and optimize mobile expenses
Industry Solutions

Strategy & Design Services

Insurance!

Retail!

Transport!

Telecom!

Government!

Healthcare!

Automotive!

IBM & Partner Applications
Application & Data Platform

Management
Devices!

Security
Network!

Analytics
Servers!

Development & Integration Services

Banking!

Cloud & Managed Services

8

© 2013 IBM Corporation
The Fiberlink acquisition will continue to add momentum to IBM’s
MobileFirst strategy, helping to provide complete solutions for mobile
management and security.
1H 2013

1H 2012

IBM acquired:
IBM announced:
IBM acquired:

Emptoris Rivermine Telecom
Expense Management

IBM Endpoint Manager
for mobile devices

IBM MessageSight

IBM announced:

IBM acquired:

IBM acquired:

Trusteer

Tealeaf CX Mobile
IBM announced:

IBM Security Access
Manager for Cloud
and Mobile

2H 2012
9

IBM announced:

IBM acquired:
Urban Code DevOps
Platform

IBM Worklight

IBM announced:

IBM acquired:

IBM Connections Mobile

Xtify
IBM acquired:

The Now Factory

2H 2013
© 2013 IBM Corporation
With Fiberlink, only IBM will provide the full spectrum of mobile management
and security needs
Requirements for Mobile Management and Security:
Business Span
of Control
High

Low

Corporate Owned
Assets

Employees w/
BYOD

Task/Temp
Workers

Business Partners

Consumer
Transactions

Solution Approaches:
Mobile Device Management
Containers – App Wrapping and SDKs
Secure Transactions

IBM / Fiberlink Offerings:
IBM Security Access
Manager for Mobile
Planned Integration Points:
•  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight)
•  Security information and events will feed into QRadar for analysis and actions will return to mobile tools
(IBM QRadar)

•  Code scans will be integrated into the process before apps are deployed into app store/catalog
(IBM AppScan)
10

© 2013 IBM Corporation
Fiberlink will strengthen IBM mobile security framework for applications and devices
Trusted Transactions
Mobile Access Mgmt
Identity Federation
Application Level VPN
Secure API Connectivity
Malware & Fraud Detection
Device & Location Risk
Account Takeover
Jailbreak w Device Rooted

Security Intelligence
SIEM
Threat Research

Personal

Secure the Application

Enterprise
Applications

App Wrapping or SDK
iOS / Android Static Scanning
Worklight Mobile IDE
Experience Management
Tamper Proofing *partner
Enterprise
Container
Cloud Services

Secure the Device
Enroll w Configurew Monitor
Provision w Wipe w Fingerprint
11

© 2013 IBM Corporation
With Fiberlink, IBM will deliver first-class Unified Device Management
Continuously monitor the health and security of all enterprise computers and mobile devices in real-time
from a single console
•  SaaS, On-premise, or MSP

Endpoints

•  Scales from small to
enterprise class
environments
Desktop / laptop / server endpoint

Patch
Management

Lifecycle
Management

Mobile

Purpose specific

Software Use
Analysis

Mobile
Devices

•  Robust, flexible architecture
with built-in failover
•  Nearly-invisible impact to
network, endpoints
•  Operates in low-bandwidth /
high-latency environments

Power
Management

Core
Protection

Systems Management

Server
Automation

Security and
Compliance

•  Physical or virtual, network or
Internet-connected

Security Management

IBM Endpoint Manager / Fiberlink
12

© 2013 IBM Corporation
Summary and Contacts
§  IBM continues to invest in innovative technologies that deliver client value.
§  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise
Mobility Management.
§  Fiberlink provides mobile management and security capabilities that are proven, simple and
fast, with comprehensive layered security and seamless integration, delivered as a service
§  With Fiberlink, IBM will deliver:
–  Full application lifecycle to build, run, deploy and manage mobile applications
–  Next generation security for mobile devices, applications and trusted transactions
–  Unified device management solution for mobile, laptop, desktop and server.

§  We welcome your thoughts and feedback
Contact us with any questions or feedback
Ron Favali

IBM IT Analyst Relations

IBM Mobile Analyst Relations
favali@us.ibm.com

analyst@us.ibm.com
Web site: www.ibm.com/itanalyst

Wes Gyure
IBM Software, Cloud & Smarter Infrastructure
wgyure@us.ibm.com
13

© 2013 IBM Corporation
Twitter: #IBM #Fiberlink

© Copyright IBM Corporation 2013. All rights reserved. The information contained in
these materials is provided for informational purposes only, and is provided AS IS without
warranty of any kind, express or implied. IBM shall not be responsible for any damages
arising out of the use of, or otherwise related to, these materials. Nothing contained in these
materials is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and conditions of
the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in
these materials may change at any time at IBM’s sole discretion based on market
opportunities or other factors, and are not intended to be a commitment to future product or
feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the
Telelogic logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other
company, product, or service names may be trademarks or service marks of others.
14

© 2013 IBM Corporation

Weitere ähnliche Inhalte

Was ist angesagt?

Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
Mobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionMobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionLeigh Williamson
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM Events
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
Company presentation
Company presentationCompany presentation
Company presentationarunkuri
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...Foong Yen Lee
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 

Was ist angesagt? (20)

Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
Mobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT SessionMobile World Congress 2013 IBM-ATT Session
Mobile World Congress 2013 IBM-ATT Session
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Company presentation
Company presentationCompany presentation
Company presentation
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
IBM Recipe: 1 part IoT Foundation, 2 parts IBM Bluemix - mix them to create ...
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 

Ähnlich wie IBM Announce Intent to Acquire Fiberlink Analyst Presentation

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Vidyasagar Machupalli
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSteven Cull
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 

Ähnlich wie IBM Announce Intent to Acquire Fiberlink Analyst Presentation (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solution
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
ZSS03120USEN.PDF
ZSS03120USEN.PDFZSS03120USEN.PDF
ZSS03120USEN.PDF
 

Kürzlich hochgeladen

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

IBM Announce Intent to Acquire Fiberlink Analyst Presentation

  • 1. Expanding the Vision of Enterprise Mobility Management Overview of IBM’s planned acquisition of Fiberlink Communications Analyst Briefing November 2013 1 © 2013 IBM Corporation
  • 2. Agenda §  Announcing IBM’s intention to acquire Fiberlink §  How IBM and Fiberlink will expand the definition of Enterprise Mobility Management §  Who is Fiberlink and why Fiberlink §  Fiberlink customer proof points §  How IBM and Fiberlink will deliver a comprehensive Mobility Solution §  Summary and Analyst Relations contacts 2 © 2013 IBM Corporation
  • 3. IBM research* identifies four Mobile entry points that all need effective Management and Security Create new value at the moment of awareness (CxO, LOB Exec) Connect with customers in context Integrate mobile into the fabric of the organization (CMO) (CIO, CISO, IT Exec) Develop and run applications (VP Apps, Developer) *Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts. © 2013 IBM Corporation Read the report at http://ibm.co/ibvmobile
  • 4. IBM announces the intention to acquire Fiberlink With Fiberlink, IBM will expand the vision of Enterprise Mobility Management Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get started in just minutes. v  Extends IBM’s MobileFirst Technology Platform ü  An integrated enterprise mobile solution ü  Eight (8) acquisitions in the last 18 months ü  Innovative & Evolving (125 patents in 18 months) v BYOD and Trusted Transactions ü  Policy-based security ü  Dual persona and Personal Information Protection (Container) ü  Mobile application, content, and document management ü  Next generation mobile security with Trusteer ü  Malware and account take-over detection v  Comprehensive mobile platform ü  ü  ü  ü  Full mobile application lifecycle with Worklight Unified device management Seamless integration with enterprise technologies Advanced and broad mobile OS support v  Rapid time-to-value ü  Enroll devices in less than 5 minutes with a SelfService cloud (SaaS Solution) ü  Simple employee on-boarding capabilities ü  Manage BYOD and corporate devices ü  Reduce IT Help Desk dependencies ü  Scales from 10s of devices to full Enterprise deployments ü  Backed by the IBM X-Force Threat Research Team 4 © 2013 IBM Corporation
  • 5. Who is Fiberlink? §  Founded in 1991, Fiberlink has built expertise in delivering mobile management and security as a service §  Headquartered in Blue Bell, PA §  Provides Mobile Device Management, Mobile Application Management, Enterprise Container with SDK and App-Wrapping, Secure Document Sharing and Mobile Expense Management as a Service helping enterprises connect, control and secure mobile devices to gain competitive advantage, increase employee productivity, and implement proper security measures §  Industry leading and award winning §  §  §  §  Cloud-based mobility management platform Seamless integration with existing enterprise systems Broad range of mobile OS support Robust policies for Bring Your Own Device (BYOD) security and privacy §  3500+ clients §  Marquee financial, healthcare, public sector, education, and retail customers §  Delivering value to enterprises of all sizes: small to large 5 © 2013 IBM Corporation
  • 6. Why Fiberlink? Lotus   Device Management & Security AD/LDAP   App Management & Security Exchange   Enterprise DLP & Security BES   Certs   Simple Seamless and fast with an exceptional experience integration with your infrastructure SaaS implementation provided 100% Day Zero iOS7 support in every customer environment Comprehensive corporate directory and email (On-Prem or Cloud) integration in under an hour Proven approach to cloud mobility management Only FISMA certified MDM platform. Comprehensive layered security A complete solution to secure the device, the app, and the data. Reduce Management Cost Improve Security Compliance & Reduce Risk Quickly deploy, enroll and manage devices, apps and docs with automatic updates without additional hardware costs or maintenance hassles. 6 Improve productivity & employee satisfaction Provide end-to-end accessibility so your employees can truly take the business wherever they go. Protect data by enforcing policies and providing device and application security on BYOD and business-issued devices. © 2013 IBM Corporation
  • 7. Fiberlink solutions deliver measureable business results Desert Schools Federal Credit Union CDW Driving Down Costs Reducing Risk, Improving Employee Satisfaction Issue: Mobile device management solutions expensive and difficult to implement. Issue: Secure Corporate Owned and Employee Owned Devices Fiberlink solution provided: Fiberlink solution provided: §  Efficient mobile application management, resulting in 92% time savings for IT §  Increased employee satisfaction with ability to choose their own devices §  50% cost savings through the transfer of device management responsibilities from Level 2 Engineers to service desk employees §  Self-enrollment of new devices by employees in only a few minutes §  IT saves 17-35 hours monthly on testing and enrolling new devices Eastman Chemical U.S. Department of Commerce Securing Mobile Devices Maintaining Compliance Issue: Rapid proliferation of unsecured, unmanaged smartphones and tablet devices had the potential of compromising sensitive corporate information. Issue: Difficulty expanding mobile offerings while maintaining compliance Fiberlink solution provided: §  Employee self-service enrollment and end user portal for help desk functions §  Ability to securely access corporate networks on popular devices of their choosing §  Employees access a catalog of public and private apps on demand, and are alerted to updates as they occur 7 Fiberlink solution provided: §  Integrated mobility management capabilities across devices, apps and documents, delivering a more efficient and secure infrastructure operations model. §  Continuous monitoring, automated enforcement and remediation on any device out of compliance with agency policies. © 2013 IBM Corporation
  • 8. Fiberlink’s Mobile Management and Security Solution will enrich the IBM MobileFirst Capabilities Integrating Mobile into the fabric of your organization: ü  Full application lifecycle to build, run, deploy and manage mobile applications ü  Embedded security for mobile devices and applications to secure transactions ü  Manage secure, sensitive data, regardless of the device ü  Manage, track and optimize mobile expenses Industry Solutions Strategy & Design Services Insurance! Retail! Transport! Telecom! Government! Healthcare! Automotive! IBM & Partner Applications Application & Data Platform Management Devices! Security Network! Analytics Servers! Development & Integration Services Banking! Cloud & Managed Services 8 © 2013 IBM Corporation
  • 9. The Fiberlink acquisition will continue to add momentum to IBM’s MobileFirst strategy, helping to provide complete solutions for mobile management and security. 1H 2013 1H 2012 IBM acquired: IBM announced: IBM acquired: Emptoris Rivermine Telecom Expense Management IBM Endpoint Manager for mobile devices IBM MessageSight IBM announced: IBM acquired: IBM acquired: Trusteer Tealeaf CX Mobile IBM announced: IBM Security Access Manager for Cloud and Mobile 2H 2012 9 IBM announced: IBM acquired: Urban Code DevOps Platform IBM Worklight IBM announced: IBM acquired: IBM Connections Mobile Xtify IBM acquired: The Now Factory 2H 2013 © 2013 IBM Corporation
  • 10. With Fiberlink, only IBM will provide the full spectrum of mobile management and security needs Requirements for Mobile Management and Security: Business Span of Control High Low Corporate Owned Assets Employees w/ BYOD Task/Temp Workers Business Partners Consumer Transactions Solution Approaches: Mobile Device Management Containers – App Wrapping and SDKs Secure Transactions IBM / Fiberlink Offerings: IBM Security Access Manager for Mobile Planned Integration Points: •  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight) •  Security information and events will feed into QRadar for analysis and actions will return to mobile tools (IBM QRadar) •  Code scans will be integrated into the process before apps are deployed into app store/catalog (IBM AppScan) 10 © 2013 IBM Corporation
  • 11. Fiberlink will strengthen IBM mobile security framework for applications and devices Trusted Transactions Mobile Access Mgmt Identity Federation Application Level VPN Secure API Connectivity Malware & Fraud Detection Device & Location Risk Account Takeover Jailbreak w Device Rooted Security Intelligence SIEM Threat Research Personal Secure the Application Enterprise Applications App Wrapping or SDK iOS / Android Static Scanning Worklight Mobile IDE Experience Management Tamper Proofing *partner Enterprise Container Cloud Services Secure the Device Enroll w Configurew Monitor Provision w Wipe w Fingerprint 11 © 2013 IBM Corporation
  • 12. With Fiberlink, IBM will deliver first-class Unified Device Management Continuously monitor the health and security of all enterprise computers and mobile devices in real-time from a single console •  SaaS, On-premise, or MSP Endpoints •  Scales from small to enterprise class environments Desktop / laptop / server endpoint Patch Management Lifecycle Management Mobile Purpose specific Software Use Analysis Mobile Devices •  Robust, flexible architecture with built-in failover •  Nearly-invisible impact to network, endpoints •  Operates in low-bandwidth / high-latency environments Power Management Core Protection Systems Management Server Automation Security and Compliance •  Physical or virtual, network or Internet-connected Security Management IBM Endpoint Manager / Fiberlink 12 © 2013 IBM Corporation
  • 13. Summary and Contacts §  IBM continues to invest in innovative technologies that deliver client value. §  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise Mobility Management. §  Fiberlink provides mobile management and security capabilities that are proven, simple and fast, with comprehensive layered security and seamless integration, delivered as a service §  With Fiberlink, IBM will deliver: –  Full application lifecycle to build, run, deploy and manage mobile applications –  Next generation security for mobile devices, applications and trusted transactions –  Unified device management solution for mobile, laptop, desktop and server. §  We welcome your thoughts and feedback Contact us with any questions or feedback Ron Favali IBM IT Analyst Relations IBM Mobile Analyst Relations favali@us.ibm.com analyst@us.ibm.com Web site: www.ibm.com/itanalyst Wes Gyure IBM Software, Cloud & Smarter Infrastructure wgyure@us.ibm.com 13 © 2013 IBM Corporation
  • 14. Twitter: #IBM #Fiberlink © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. 14 © 2013 IBM Corporation