SlideShare ist ein Scribd-Unternehmen logo
1 von 12
MANAGE & SECURE YOUR
      MOBILE ENTERPRISE
      Vijay Dheap, Product Manager IBM Mobile Security Solutions
      Kimber Spradlin, Product Marketing Manager IBM Endpoint Manager
      Peter Tosto, Portfolio Strategist IBM GTS Managed Services

                                                                        1
© 2012 IBM Corporation
Visualizing the Threats to Mobile Computing

                                    Insecure                                        Mobile
                           WiFi     access points
                                                          Malicious                 apps
                                                          apps or web
                                                          sites
        Lost
        devices              Network
                             attacks
                                                                                    Web
                                             Internet
                                                                                    sites

                         Telecom
                                                                                             Corporate
                         Provider
                                                                                             Intranet

                              Compromised               Attempts at
                              or Rogue                  unauthorized
 Threat of                                              access
                              Devices                                   Corporate
 Data Loss
                                                                        Gateway
                                               Mobile
                         Bluetooth
                                               Device
                         Connection




                                                                                                   2
© 2012 IBM Corporation
Mobile Management & Security: Spectrum of Requirements




                                                          3
© 2012 IBM Corporation
Securing the Device



                                     Mobile
                                     apps



                          Internet   Web
                                     sites

                                              Corporate Intranet
Secure endpoint
device and data




                                                          4
 © 2012 IBM Corporation
IBM Endpoint Manager for Mobile Devices




                                           5
© 2012 IBM Corporation
IBM Hosted Mobile Device Security Management




       Hosted
     Mobile Device                                      For Business Customers
       Security
                                                        Enforce IT policies
                             For Service Providers
                                                        Protect against malware
                         Monetize smartphone services
                                                        Prevent data loss
                         Capitalize on BYOD
                                                        Reduce IT overhead
                         Differentiate your offering


                         Minimize development expense
   Turn-key solution
  for securing mobile
        devices




                                                                              6
© 2012 IBM Corporation
Enterprise Demand for Mobile Security




                                         7
© 2012 IBM Corporation
Network, Data and Access Security

                                                          Mobile
                                                          apps



                                                           Web
                                                           sites



                                  Internet




                         Secure connectivity


                                                     Corporate Intranet

                                               Protect access to enterprise
                                                  applications and data


                                                                              8
© 2012 IBM Corporation
Application Layer Security

                                    Develop, test and deliver safe
                                            applications
                                                      Mobile
                                                      apps



                                                       Web
                                                       sites



                         Internet




                                                 Corporate Intranet



                                                                      9
© 2012 IBM Corporation
Mobile Security Intelligence



                         Achieve Visibility and Enable
                          Adaptive Security Posture            Mobile
                                                               apps



                                                                Web
                                                                sites



                                               Internet




                                                          Corporate Intranet



                                                                               10
© 2012 IBM Corporation
IBM Mobile Management & Security: Taking a Holistic Approach
                                                           IBM Worklight
                                                           IBM AppScan
                                           IBM QRadar
    Achieve Visibility and Enable
     Adaptive Security Posture                                          Mobile
                                                                        apps         Develop, test
                                                                                    and deliver safe
 IBM Endpoint                                                                        applications
  Manager for Mobile                                                     Web
 IBM WorkLight                                                          sites
                           IBM Mobile Connect
                                                           IBM Security Access
                                              Internet      Manager                 Protect access to
                                                                                        enterprise
                                    Secure connectivity
                                                                                  applications and data

  Secure
 endpoint
device and
   data
                                                                 Corporate Intranet


                                                                                                11
 © 2012 IBM Corporation
www.ibm.com/mobile-enterprise



                                      12
© 2012 IBM Corporation

Weitere Àhnliche Inhalte

Andere mochten auch

Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksProductNation/iSPIRT
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile EnterpriseUnisys Corporation
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
MOBOCOP Enterprise Mobile Security
MOBOCOP Enterprise Mobile SecurityMOBOCOP Enterprise Mobile Security
MOBOCOP Enterprise Mobile SecurityJason AR
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Five Trends from Mobile World Congress 2015
Five Trends from Mobile World Congress 2015Five Trends from Mobile World Congress 2015
Five Trends from Mobile World Congress 2015Ogilvy Consulting
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Securitytbeckwith
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 

Andere mochten auch (11)

Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
MOBOCOP Enterprise Mobile Security
MOBOCOP Enterprise Mobile SecurityMOBOCOP Enterprise Mobile Security
MOBOCOP Enterprise Mobile Security
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Five Trends from Mobile World Congress 2015
Five Trends from Mobile World Congress 2015Five Trends from Mobile World Congress 2015
Five Trends from Mobile World Congress 2015
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 

Mehr von IBM WebSphereIndia

Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software IBM WebSphereIndia
 
Extending IT Investment with Connectivity & Integration
Extending IT Investment with Connectivity & IntegrationExtending IT Investment with Connectivity & Integration
Extending IT Investment with Connectivity & IntegrationIBM WebSphereIndia
 
Websphere Application Server V8.5
Websphere Application Server V8.5Websphere Application Server V8.5
Websphere Application Server V8.5IBM WebSphereIndia
 
Process Innovation for 2012
Process Innovation for 2012Process Innovation for 2012
Process Innovation for 2012IBM WebSphereIndia
 
Websphere Application Server: Much more than Open Source
Websphere Application Server: Much more than Open SourceWebsphere Application Server: Much more than Open Source
Websphere Application Server: Much more than Open SourceIBM WebSphereIndia
 
Smarter lending leads to Business Agility
Smarter lending leads to Business AgilitySmarter lending leads to Business Agility
Smarter lending leads to Business AgilityIBM WebSphereIndia
 
Enable process visbility: The Value Proposition for SAP customers
Enable process visbility: The Value Proposition for SAP customers Enable process visbility: The Value Proposition for SAP customers
Enable process visbility: The Value Proposition for SAP customers IBM WebSphereIndia
 
Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementIBM WebSphereIndia
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 

Mehr von IBM WebSphereIndia (13)

Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software Collaborative lifecycle development for Mobile Software
Collaborative lifecycle development for Mobile Software
 
IBM Mobile Strategy
IBM Mobile StrategyIBM Mobile Strategy
IBM Mobile Strategy
 
Extending IT Investment with Connectivity & Integration
Extending IT Investment with Connectivity & IntegrationExtending IT Investment with Connectivity & Integration
Extending IT Investment with Connectivity & Integration
 
Websphere Application Server V8.5
Websphere Application Server V8.5Websphere Application Server V8.5
Websphere Application Server V8.5
 
Process Innovation for 2012
Process Innovation for 2012Process Innovation for 2012
Process Innovation for 2012
 
Websphere Application Server: Much more than Open Source
Websphere Application Server: Much more than Open SourceWebsphere Application Server: Much more than Open Source
Websphere Application Server: Much more than Open Source
 
Smarter lending leads to Business Agility
Smarter lending leads to Business AgilitySmarter lending leads to Business Agility
Smarter lending leads to Business Agility
 
Enable process visbility: The Value Proposition for SAP customers
Enable process visbility: The Value Proposition for SAP customers Enable process visbility: The Value Proposition for SAP customers
Enable process visbility: The Value Proposition for SAP customers
 
Transform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision ManagementTransform your Insurance Processes with BPM and Decision Management
Transform your Insurance Processes with BPM and Decision Management
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
IBM Worklight-Overview
IBM Worklight-OverviewIBM Worklight-Overview
IBM Worklight-Overview
 
IBM PureSystems
IBM PureSystemsIBM PureSystems
IBM PureSystems
 
Impact 2010 Pictures
Impact 2010 PicturesImpact 2010 Pictures
Impact 2010 Pictures
 

KĂŒrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

KĂŒrzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Manage and Secure Your Mobile Enterprise

  • 1. MANAGE & SECURE YOUR MOBILE ENTERPRISE Vijay Dheap, Product Manager IBM Mobile Security Solutions Kimber Spradlin, Product Marketing Manager IBM Endpoint Manager Peter Tosto, Portfolio Strategist IBM GTS Managed Services 1 © 2012 IBM Corporation
  • 2. Visualizing the Threats to Mobile Computing Insecure Mobile WiFi access points Malicious apps apps or web sites Lost devices Network attacks Web Internet sites Telecom Corporate Provider Intranet Compromised Attempts at or Rogue unauthorized Threat of access Devices Corporate Data Loss Gateway Mobile Bluetooth Device Connection 2 © 2012 IBM Corporation
  • 3. Mobile Management & Security: Spectrum of Requirements 3 © 2012 IBM Corporation
  • 4. Securing the Device Mobile apps Internet Web sites Corporate Intranet Secure endpoint device and data 4 © 2012 IBM Corporation
  • 5. IBM Endpoint Manager for Mobile Devices 5 © 2012 IBM Corporation
  • 6. IBM Hosted Mobile Device Security Management Hosted Mobile Device For Business Customers Security Enforce IT policies For Service Providers Protect against malware Monetize smartphone services Prevent data loss Capitalize on BYOD Reduce IT overhead Differentiate your offering Minimize development expense Turn-key solution for securing mobile devices 6 © 2012 IBM Corporation
  • 7. Enterprise Demand for Mobile Security 7 © 2012 IBM Corporation
  • 8. Network, Data and Access Security Mobile apps Web sites Internet Secure connectivity Corporate Intranet Protect access to enterprise applications and data 8 © 2012 IBM Corporation
  • 9. Application Layer Security Develop, test and deliver safe applications Mobile apps Web sites Internet Corporate Intranet 9 © 2012 IBM Corporation
  • 10. Mobile Security Intelligence Achieve Visibility and Enable Adaptive Security Posture Mobile apps Web sites Internet Corporate Intranet 10 © 2012 IBM Corporation
  • 11. IBM Mobile Management & Security: Taking a Holistic Approach  IBM Worklight  IBM AppScan  IBM QRadar Achieve Visibility and Enable Adaptive Security Posture Mobile apps Develop, test and deliver safe  IBM Endpoint applications Manager for Mobile Web  IBM WorkLight sites  IBM Mobile Connect  IBM Security Access Internet Manager Protect access to enterprise Secure connectivity applications and data Secure endpoint device and data Corporate Intranet 11 © 2012 IBM Corporation
  • 12. www.ibm.com/mobile-enterprise 12 © 2012 IBM Corporation