SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
© 2013 IBM Corporation
Expanding the Vision of Enterprise Mobility
Management
Overview of IBM’s planned acquisition of
Fiberlink Communications
Analyst Briefing
November 2013
1
© 2013 IBM Corporation
Agenda
§  Announcing IBM’s intention to acquire
Fiberlink
§  How IBM and Fiberlink will expand the
definition of Enterprise Mobility Management
§  Who is Fiberlink and why Fiberlink
§  Fiberlink customer proof points
§  How IBM and Fiberlink will deliver a
comprehensive Mobility Solution
§  Summary and Analyst Relations contacts
2
© 2013 IBM Corporation
IBM research* identifies four Mobile entry points that all need
effective Management and Security
*Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts.
Read the report at http://ibm.co/ibvmobile
(CIO, CISO, IT Exec)
(CMO)
(VP Apps, Developer)
(CxO, LOB Exec)
Integrate mobile
into the fabric
of the organization
Connect with
customers in context
Create new value at the
moment of awareness
Develop and run applications
© 2013 IBM Corporation
IBM announces the intention to acquire Fiberlink
4
With Fiberlink, IBM will expand the vision of Enterprise Mobility Management
v  Extends IBM’s MobileFirst Technology
Platform
ü  An integrated enterprise mobile solution
ü  Eight (8) acquisitions in the last 18 months
ü  Innovative & Evolving (125 patents in 18 months)
v BYOD and Trusted Transactions
ü  Policy-based security
ü  Dual persona and Personal Information
Protection (Container)
ü  Mobile application, content, and document
management
ü  Next generation mobile security with Trusteer
ü  Malware and account take-over detection
ü  Backed by the IBM X-Force Threat Research
Team
Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the
ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get
started in just minutes.
v  Comprehensive mobile platform
ü  Full mobile application lifecycle with Worklight
ü  Unified device management
ü  Seamless integration with enterprise technologies
ü  Advanced and broad mobile OS support
v  Rapid time-to-value
ü  Enroll devices in less than 5 minutes with a Self-
Service cloud (SaaS Solution)
ü  Simple employee on-boarding capabilities
ü  Manage BYOD and corporate devices
ü  Reduce IT Help Desk dependencies
ü  Scales from 10s of devices to full Enterprise
deployments
© 2013 IBM Corporation
§  Founded in 1991, Fiberlink has built expertise in delivering mobile
management and security as a service
§  Headquartered in Blue Bell, PA
Who is Fiberlink?
5
§  Provides Mobile Device Management, Mobile Application Management,
Enterprise Container with SDK and App-Wrapping, Secure Document
Sharing and Mobile Expense Management as a Service helping enterprises
connect, control and secure mobile devices to gain competitive advantage,
increase employee productivity, and implement proper security measures
§  Industry leading and award winning
§  Cloud-based mobility management platform
§  Seamless integration with existing enterprise systems
§  Broad range of mobile OS support
§  Robust policies for Bring Your Own Device (BYOD) security and privacy
§  3500+ clients
§  Marquee financial, healthcare, public sector, education, and retail customers
§  Delivering value to enterprises of all sizes: small to large
© 2013 IBM Corporation
Why Fiberlink?
6
Simple
and fast with an
exceptional experience
Lotus	
  
AD/LDAP	
  
Exchange	
  
BES	
  
Certs	
  
Seamless
integration with
your infrastructure
Proven
approach to cloud
mobility
management
SaaS implementation provided
100% Day Zero iOS7 support
in every customer environment
Comprehensive corporate
directory and email (On-Prem or
Cloud) integration in under an hour
Only FISMA certified
MDM platform.
Quickly deploy, enroll and
manage devices, apps and
docs with automatic updates
without additional hardware
costs or maintenance hassles.
Reduce Management Cost
Provide end-to-end
accessibility so your
employees can truly take the
business wherever they go.
Improve productivity &
employee satisfaction
Protect data by enforcing
policies and providing device
and application security on
BYOD and business-issued
devices.
Improve Security Compliance
& Reduce Risk
Comprehensive
layered security
A complete solution to
secure the device, the
app, and the data.
Device Management
& Security
App Management
& Security
Enterprise DLP
& Security
© 2013 IBM Corporation
Fiberlink solutions deliver measureable business results
7
Desert Schools Federal Credit Union
Driving Down Costs
Issue: Mobile device management solutions expensive
and difficult to implement.
Fiberlink solution provided:
§  Efficient mobile application management, resulting in 92%
time savings for IT
§  50% cost savings through the transfer of device
management responsibilities from Level 2 Engineers to
service desk employees
U.S. Department of Commerce
Maintaining Compliance
Issue: Difficulty expanding mobile offerings while maintaining
compliance
Fiberlink solution provided:
§  Integrated mobility management capabilities across
devices, apps and documents, delivering a more efficient
and secure infrastructure operations model.
§  Continuous monitoring, automated enforcement and
remediation on any device out of compliance with agency
policies.
CDW
Reducing Risk, Improving Employee Satisfaction
Issue: Secure Corporate Owned and Employee Owned
Devices
Fiberlink solution provided:
§  Increased employee satisfaction with ability to choose
their own devices
§  Self-enrollment of new devices by employees in only a few
minutes
§  IT saves 17-35 hours monthly on testing and enrolling
new devices
Eastman Chemical
Securing Mobile Devices
Issue: Rapid proliferation of unsecured, unmanaged
smartphones and tablet devices had the potential of
compromising sensitive corporate information.
Fiberlink solution provided:
§  Employee self-service enrollment and end user portal
for help desk functions
§  Ability to securely access corporate networks on popular
devices of their choosing
§  Employees access a catalog of public and private apps
on demand, and are alerted to updates as they occur
© 2013 IBM Corporation
Fiberlink’s Mobile Management and Security Solution will enrich the
IBM MobileFirst Capabilities
8
Industry Solutions
IBM & Partner Applications
Banking! Insurance! Transport! Telecom! Government!Retail! Healthcare! Automotive!
Application & Data Platform
Strategy&DesignServices
Cloud & Managed Services
Devices! Network! Servers!
Development&IntegrationServices
Management AnalyticsSecurity
Integrating Mobile into the fabric of your organization:
ü  Full application lifecycle to build, run, deploy and manage mobile applications
ü  Embedded security for mobile devices and applications to secure transactions
ü  Manage secure, sensitive data, regardless of the device
ü  Manage, track and optimize mobile expenses
© 2013 IBM Corporation
The Fiberlink acquisition will continue to add momentum to IBM’s
MobileFirst strategy, helping to provide complete solutions for mobile
management and security.
9
1H 2012
2H 2012
1H 2013
2H 2013
IBM acquired:
The Now Factory
IBM acquired:
IBM Worklight
IBM announced:
IBM Endpoint Manager
for mobile devicesIBM acquired:
Emptoris Rivermine Telecom
Expense Management
IBM announced:
IBM Security Access
Manager for Cloud
and Mobile
IBM announced:
IBM Connections Mobile
IBM acquired:
Tealeaf CX Mobile
IBM acquired:
Trusteer
IBM acquired:
Xtify
IBM announced:
IBM acquired:
Urban Code DevOps
Platform
IBM announced:
IBM MessageSight
© 2013 IBM Corporation10
With Fiberlink, only IBM will provide the full spectrum of mobile management
and security needs
Business Span
of Control
High
Corporate Owned
Assets
Employees w/
BYOD
Task/Temp
Workers
Business Partners
Consumer
Transactions
Mobile Device Management
Containers – App Wrapping and SDKs
Secure Transactions
Low
IBM / Fiberlink Offerings:
Planned Integration Points:
•  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight)
•  Security information and events will feed into QRadar for analysis and actions will return to mobile tools
(IBM QRadar)
•  Code scans will be integrated into the process before apps are deployed into app store/catalog
(IBM AppScan)
Solution Approaches:
Requirements for Mobile Management and Security:
IBM Security Access
Manager for Mobile
© 2013 IBM Corporation
Fiberlink will strengthen IBM mobile security framework for applications and devices
Secure the Device
Enroll w Configurew Monitor
Provision w Wipe w Fingerprint
Secure the Application
App Wrapping or SDK
iOS / Android Static Scanning
Worklight Mobile IDE
Experience Management
Tamper Proofing *partner
Trusted Transactions
Mobile Access Mgmt
Identity Federation
Application Level VPN
Secure API Connectivity
Malware & Fraud Detection
Device & Location Risk
Account Takeover
Jailbreak w Device Rooted
Enterprise
Applications
Enterprise
Container
Personal
Cloud Services
Security Intelligence
SIEM
Threat Research
11
© 2013 IBM Corporation
Continuously monitor the health and security of all enterprise computers and mobile devices in real-time
from a single console
Endpoints
•  SaaS, On-premise, or MSP
•  Scales from small to
enterprise class
environments
•  Robust, flexible architecture
with built-in failover
•  Nearly-invisible impact to
network, endpoints
•  Operates in low-bandwidth /
high-latency environments
•  Physical or virtual, network or
Internet-connected
IBM Endpoint Manager / Fiberlink
Patch
Management
Lifecycle
Management
Software Use
Analysis
Power
Management
Mobile
Devices
Security and
Compliance
Core
Protection
Desktop / laptop / server endpoint Mobile Purpose specific
Systems Management Security Management
Server
Automation
With Fiberlink, IBM will deliver first-class Unified Device Management
12
© 2013 IBM Corporation
Contact us with any questions or feedback
Summary and Contacts
§  IBM continues to invest in innovative technologies that deliver client value.
§  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise
Mobility Management.
§  Fiberlink provides mobile management and security capabilities that are proven, simple and
fast, with comprehensive layered security and seamless integration, delivered as a service
§  With Fiberlink, IBM will deliver:
–  Full application lifecycle to build, run, deploy and manage mobile applications
–  Next generation security for mobile devices, applications and trusted transactions
–  Unified device management solution for mobile, laptop, desktop and server.
§  We welcome your thoughts and feedback
IBM IT Analyst Relations
analyst@us.ibm.com
Web site: www.ibm.com/itanalyst
13
Ron Favali
IBM Mobile Analyst Relations
favali@us.ibm.com
Wes Gyure
IBM Software, Cloud & Smarter Infrastructure
wgyure@us.ibm.com
© 2013 IBM Corporation
© Copyright IBM Corporation 2013. All rights reserved. The information contained in
these materials is provided for informational purposes only, and is provided AS IS without
warranty of any kind, express or implied. IBM shall not be responsible for any damages
arising out of the use of, or otherwise related to, these materials. Nothing contained in these
materials is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and conditions of
the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in
these materials may change at any time at IBM’s sole discretion based on market
opportunities or other factors, and are not intended to be a commitment to future product or
feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the
Telelogic logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other
company, product, or service names may be trademarks or service marks of others.
Twitter: #IBM #Fiberlink
14

Weitere ähnliche Inhalte

Was ist angesagt?

Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefingNitin Gaur
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseChris Pepin
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7ibmmobile
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Company presentation
Company presentationCompany presentation
Company presentationarunkuri
 

Was ist angesagt? (19)

Ibm mobile first briefing
Ibm mobile first briefingIbm mobile first briefing
Ibm mobile first briefing
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Ibm solutions for the mobile enterprise
Ibm solutions for the mobile enterpriseIbm solutions for the mobile enterprise
Ibm solutions for the mobile enterprise
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Company presentation
Company presentationCompany presentation
Company presentation
 

Ähnlich wie Ibm fiberlink analyst presentation nov 13 final

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Vidyasagar Machupalli
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightDirk Nicol
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepChris Pepin
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSteven Cull
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 

Ähnlich wie Ibm fiberlink analyst presentation nov 13 final (20)

Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
Building Enterprise enabled Cognitive Mobile application for a Hybrid Cloud E...
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
ZSS03120USEN.PDF
ZSS03120USEN.PDFZSS03120USEN.PDF
ZSS03120USEN.PDF
 
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM WorklightEngaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
Engaging Mobile Apps with IBM® Social Business Solutions and IBM Worklight
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
SyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solutionSyncShield Cross-platform MDM solution
SyncShield Cross-platform MDM solution
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 

Kürzlich hochgeladen

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 

Kürzlich hochgeladen (20)

KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 

Ibm fiberlink analyst presentation nov 13 final

  • 1. © 2013 IBM Corporation Expanding the Vision of Enterprise Mobility Management Overview of IBM’s planned acquisition of Fiberlink Communications Analyst Briefing November 2013 1
  • 2. © 2013 IBM Corporation Agenda §  Announcing IBM’s intention to acquire Fiberlink §  How IBM and Fiberlink will expand the definition of Enterprise Mobility Management §  Who is Fiberlink and why Fiberlink §  Fiberlink customer proof points §  How IBM and Fiberlink will deliver a comprehensive Mobility Solution §  Summary and Analyst Relations contacts 2
  • 3. © 2013 IBM Corporation IBM research* identifies four Mobile entry points that all need effective Management and Security *Research was conducted by IBV and Oxford Economics in 1Q13. The study represents 601 mobile strategy experts. Read the report at http://ibm.co/ibvmobile (CIO, CISO, IT Exec) (CMO) (VP Apps, Developer) (CxO, LOB Exec) Integrate mobile into the fabric of the organization Connect with customers in context Create new value at the moment of awareness Develop and run applications
  • 4. © 2013 IBM Corporation IBM announces the intention to acquire Fiberlink 4 With Fiberlink, IBM will expand the vision of Enterprise Mobility Management v  Extends IBM’s MobileFirst Technology Platform ü  An integrated enterprise mobile solution ü  Eight (8) acquisitions in the last 18 months ü  Innovative & Evolving (125 patents in 18 months) v BYOD and Trusted Transactions ü  Policy-based security ü  Dual persona and Personal Information Protection (Container) ü  Mobile application, content, and document management ü  Next generation mobile security with Trusteer ü  Malware and account take-over detection ü  Backed by the IBM X-Force Threat Research Team Enterprise Mobility Management and Security solutions from IBM will provide organizations of all sizes the ability to securely manage the diversity of mobile: device, apps, content, BYOD, networks & transactions. Get started in just minutes. v  Comprehensive mobile platform ü  Full mobile application lifecycle with Worklight ü  Unified device management ü  Seamless integration with enterprise technologies ü  Advanced and broad mobile OS support v  Rapid time-to-value ü  Enroll devices in less than 5 minutes with a Self- Service cloud (SaaS Solution) ü  Simple employee on-boarding capabilities ü  Manage BYOD and corporate devices ü  Reduce IT Help Desk dependencies ü  Scales from 10s of devices to full Enterprise deployments
  • 5. © 2013 IBM Corporation §  Founded in 1991, Fiberlink has built expertise in delivering mobile management and security as a service §  Headquartered in Blue Bell, PA Who is Fiberlink? 5 §  Provides Mobile Device Management, Mobile Application Management, Enterprise Container with SDK and App-Wrapping, Secure Document Sharing and Mobile Expense Management as a Service helping enterprises connect, control and secure mobile devices to gain competitive advantage, increase employee productivity, and implement proper security measures §  Industry leading and award winning §  Cloud-based mobility management platform §  Seamless integration with existing enterprise systems §  Broad range of mobile OS support §  Robust policies for Bring Your Own Device (BYOD) security and privacy §  3500+ clients §  Marquee financial, healthcare, public sector, education, and retail customers §  Delivering value to enterprises of all sizes: small to large
  • 6. © 2013 IBM Corporation Why Fiberlink? 6 Simple and fast with an exceptional experience Lotus   AD/LDAP   Exchange   BES   Certs   Seamless integration with your infrastructure Proven approach to cloud mobility management SaaS implementation provided 100% Day Zero iOS7 support in every customer environment Comprehensive corporate directory and email (On-Prem or Cloud) integration in under an hour Only FISMA certified MDM platform. Quickly deploy, enroll and manage devices, apps and docs with automatic updates without additional hardware costs or maintenance hassles. Reduce Management Cost Provide end-to-end accessibility so your employees can truly take the business wherever they go. Improve productivity & employee satisfaction Protect data by enforcing policies and providing device and application security on BYOD and business-issued devices. Improve Security Compliance & Reduce Risk Comprehensive layered security A complete solution to secure the device, the app, and the data. Device Management & Security App Management & Security Enterprise DLP & Security
  • 7. © 2013 IBM Corporation Fiberlink solutions deliver measureable business results 7 Desert Schools Federal Credit Union Driving Down Costs Issue: Mobile device management solutions expensive and difficult to implement. Fiberlink solution provided: §  Efficient mobile application management, resulting in 92% time savings for IT §  50% cost savings through the transfer of device management responsibilities from Level 2 Engineers to service desk employees U.S. Department of Commerce Maintaining Compliance Issue: Difficulty expanding mobile offerings while maintaining compliance Fiberlink solution provided: §  Integrated mobility management capabilities across devices, apps and documents, delivering a more efficient and secure infrastructure operations model. §  Continuous monitoring, automated enforcement and remediation on any device out of compliance with agency policies. CDW Reducing Risk, Improving Employee Satisfaction Issue: Secure Corporate Owned and Employee Owned Devices Fiberlink solution provided: §  Increased employee satisfaction with ability to choose their own devices §  Self-enrollment of new devices by employees in only a few minutes §  IT saves 17-35 hours monthly on testing and enrolling new devices Eastman Chemical Securing Mobile Devices Issue: Rapid proliferation of unsecured, unmanaged smartphones and tablet devices had the potential of compromising sensitive corporate information. Fiberlink solution provided: §  Employee self-service enrollment and end user portal for help desk functions §  Ability to securely access corporate networks on popular devices of their choosing §  Employees access a catalog of public and private apps on demand, and are alerted to updates as they occur
  • 8. © 2013 IBM Corporation Fiberlink’s Mobile Management and Security Solution will enrich the IBM MobileFirst Capabilities 8 Industry Solutions IBM & Partner Applications Banking! Insurance! Transport! Telecom! Government!Retail! Healthcare! Automotive! Application & Data Platform Strategy&DesignServices Cloud & Managed Services Devices! Network! Servers! Development&IntegrationServices Management AnalyticsSecurity Integrating Mobile into the fabric of your organization: ü  Full application lifecycle to build, run, deploy and manage mobile applications ü  Embedded security for mobile devices and applications to secure transactions ü  Manage secure, sensitive data, regardless of the device ü  Manage, track and optimize mobile expenses
  • 9. © 2013 IBM Corporation The Fiberlink acquisition will continue to add momentum to IBM’s MobileFirst strategy, helping to provide complete solutions for mobile management and security. 9 1H 2012 2H 2012 1H 2013 2H 2013 IBM acquired: The Now Factory IBM acquired: IBM Worklight IBM announced: IBM Endpoint Manager for mobile devicesIBM acquired: Emptoris Rivermine Telecom Expense Management IBM announced: IBM Security Access Manager for Cloud and Mobile IBM announced: IBM Connections Mobile IBM acquired: Tealeaf CX Mobile IBM acquired: Trusteer IBM acquired: Xtify IBM announced: IBM acquired: Urban Code DevOps Platform IBM announced: IBM MessageSight
  • 10. © 2013 IBM Corporation10 With Fiberlink, only IBM will provide the full spectrum of mobile management and security needs Business Span of Control High Corporate Owned Assets Employees w/ BYOD Task/Temp Workers Business Partners Consumer Transactions Mobile Device Management Containers – App Wrapping and SDKs Secure Transactions Low IBM / Fiberlink Offerings: Planned Integration Points: •  SDKs will be packaged in Worklight IDE so all apps can be secured (IBM Worklight) •  Security information and events will feed into QRadar for analysis and actions will return to mobile tools (IBM QRadar) •  Code scans will be integrated into the process before apps are deployed into app store/catalog (IBM AppScan) Solution Approaches: Requirements for Mobile Management and Security: IBM Security Access Manager for Mobile
  • 11. © 2013 IBM Corporation Fiberlink will strengthen IBM mobile security framework for applications and devices Secure the Device Enroll w Configurew Monitor Provision w Wipe w Fingerprint Secure the Application App Wrapping or SDK iOS / Android Static Scanning Worklight Mobile IDE Experience Management Tamper Proofing *partner Trusted Transactions Mobile Access Mgmt Identity Federation Application Level VPN Secure API Connectivity Malware & Fraud Detection Device & Location Risk Account Takeover Jailbreak w Device Rooted Enterprise Applications Enterprise Container Personal Cloud Services Security Intelligence SIEM Threat Research 11
  • 12. © 2013 IBM Corporation Continuously monitor the health and security of all enterprise computers and mobile devices in real-time from a single console Endpoints •  SaaS, On-premise, or MSP •  Scales from small to enterprise class environments •  Robust, flexible architecture with built-in failover •  Nearly-invisible impact to network, endpoints •  Operates in low-bandwidth / high-latency environments •  Physical or virtual, network or Internet-connected IBM Endpoint Manager / Fiberlink Patch Management Lifecycle Management Software Use Analysis Power Management Mobile Devices Security and Compliance Core Protection Desktop / laptop / server endpoint Mobile Purpose specific Systems Management Security Management Server Automation With Fiberlink, IBM will deliver first-class Unified Device Management 12
  • 13. © 2013 IBM Corporation Contact us with any questions or feedback Summary and Contacts §  IBM continues to invest in innovative technologies that deliver client value. §  Fiberlink complements capabilities in IBM MobileFirst and will expand the vision of Enterprise Mobility Management. §  Fiberlink provides mobile management and security capabilities that are proven, simple and fast, with comprehensive layered security and seamless integration, delivered as a service §  With Fiberlink, IBM will deliver: –  Full application lifecycle to build, run, deploy and manage mobile applications –  Next generation security for mobile devices, applications and trusted transactions –  Unified device management solution for mobile, laptop, desktop and server. §  We welcome your thoughts and feedback IBM IT Analyst Relations analyst@us.ibm.com Web site: www.ibm.com/itanalyst 13 Ron Favali IBM Mobile Analyst Relations favali@us.ibm.com Wes Gyure IBM Software, Cloud & Smarter Infrastructure wgyure@us.ibm.com
  • 14. © 2013 IBM Corporation © Copyright IBM Corporation 2013. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Twitter: #IBM #Fiberlink 14