IBM Cloud

IBM Cloud

Image

Projects Detail

Cloud Services
IBM MaaS360 with Watson

 

IBM MaaS360 is a complete unified endpoint management (UEM) tool used to enable endpoints, end users and everything in between. MaaS360 supports smartphones and tablets, laptops and desktops, ruggedised devices, wearables and Internet of Things. It allows businesses to manage and safeguard mobile devices, apps, and content within an easy-to-install container that sits separately on mobile devices and tablets, allowing organisations to use a BYOD policy and ensure their company documents are kept secure, while also ensuring that employee personal data remains safe and separate.

Key Highlights

Easily manage devices

See all devices in one place, and manage devices and policies over-the-air, allowing you to quickly enforce rules and perform functions on a wide scale

Keep apps and data secure

Access information without the risk of data leaks. Show apps within the secure container, and prevent functions such as copy and paste, and forwarding

Quickly deploy apps

Promote, distribute, and update apps using an interactive catalogue. Separate business apps on devices to prevent information from getting into the wrong hands

Real-time insights

Watson delivers cognitive insights, contextual analytics, and cloud-sourced benchmarking to give a complete overview of endpoint activity

 

 

What is IBM MaaS360?

IBM MaaS360 is a comprehensive enterprise mobility management (EMM) platform that enables apps and content with trust on any device, at anytime and from anywhere by delivering mobile security for the way people work.
Why do we need an enterprise mobility management (EMM) solution?"

Mobile is rapidly transforming how organizations do business. However, managing and protecting the mobile devices, apps and content that contain sensitive corporate data can present overwhelming challenges for any IT or Security team. An EMM solution can help simplify the move to mobile by:
• Managing your entire mobile device fleet

• Increasing productivity with secured emails, apps and content

• Reducing security and compliance risks

• Controlling your entire mobile IT environment"

What device types and associated software versions are supported by IBM MaaS360 Mobile Device Management?

Compatible with iOS 4.3+, Android 2.2+, Windows Phone 7.5+, BlackBerry 5.0+ and Amazon Fire OS devices. IBM MaaS360 Laptop Management supports Microsoft Windows XP SP3, Windows Vista, Windows 7, Windows 8/8.1+, Windows 10 and Mac OS X 10.5 up. Instant, same day support of the latest mobile OS platform releases and upgrades is included.

How do users authenticate and enrol their mobile devices with IBM MaaS360?

IBM MaaS360 administrators can send enrolment requests over the air (OTA) using SMS, email, or a custom URL. These are sent directly from the portal, preventing unauthorized devices from gaining access to without approval. Approved users may authenticate by either entering the passcode provided in their enrolment email or entering the corporate credentials used to log into their computer.

What types of automated compliance rules can be set?

IBM MaaS360 Mobile Device Management can enforce automated compliance rules on your enrolled smartphones and tablets—and take the actions you specify when those rules have been broken. Compliance rules include: passcode policy adherence, minimum OS version, remote wipe and encryption support, Jailbroken (iOS) or Rooted (Android) devices, application policies, SIM changes, roaming or surpassing data usage thresholds. Automatic actions include alerting the user and/or administrators, blocking it from accessing the network, changing the policy, conducting a selective or full wipe, removing MDM control or hiding the device.

Can we restrict access to corporate data when devices are lost, stolen, or noncompliant?

Yes. Users may remotely block lost or stolen devices until they can be located. In more serious circumstances you can change the passcode or conduct a selective or full wipe of the device to protect corporate data. Administrators can perform the same actions for noncompliant devices unless users take requested steps to remediate their policy violations.

What types of reporting options are available?

Mobility Intelligence executive and operational dashboards and reporting give a centralized, view and focus for potential issues, asset tracking and simplified management, including visibility into hardware and software inventory, configuration and vulnerability details, distribution of mobile devices across OS platforms, approval status, device capabilities, and ownership (corporate or user).

Does IBM have the capability to access our email data?

No. While IBM MaaS360 has a multi-tenant architecture, customer data is sandboxed with strong security walls so it is accessible only to the customer. The solution cannot store sensitive corporate data, such as emails, message exchanges, attachments or app data. Cloud Extender ties into your backend systems in a non-intrusive way and is not inline proxy with your critical messaging flows, so it is not in the direct path of email and does not store emails.

Can I see my users’ private information or data on their personal mobile devices (BYOD)?

No, IBM MaaS360 does not have access to personal data (e.g., emails, SMS or photos). With BYOD Privacy Settings enabled, administrators are restricted from viewing personal applications installed outside of the corporate app catalogue. Location services can also be disabled to prevent access to location indicators such as physical address, geographical coordinates, IP address and Wi-Fi SSID.

Do you support encryption of emails, attachments and/or documents?

How does it work?IBM MaaS360 Productivity Suite and IBM MaaS360 Content Suite provide FIPS 140-2 compliant, AES-256 encryption for iOS, Android and Windows Phone devices. Through authentication and authorization, only approved users can access sensitive emails and data. All apps and documents are encrypted using AES-256 encryption. Each app and document uses its own unique encryption keys, and content access requires authentication.

Why would we need a DLP/container solution?

Boosting productivity and mitigating risk are top of mind for companies as they expand employee access to corporate email, apps and documents from mobile devices they do not own.For BYOD programs, containers are an efficient way to provide a completely separate “sandbox” area for work and control the movement of data – without needing to enrol personal devices in a mobile device management (MDM) solution. They preserve user privacy, drive user adoption, and protect the organization.

 

In order to buy and resell IBM SaaS MaaS360 you must:

If not already, enroll your company in IBM PartnerWorld. You can join here: https://www-356.ibm.com/partnerworld/wps/servlet/ContentHandler/join-partnerworld

If not already, enroll your company as an IBM Cloud Marketplace Reseller. You can join here: https://www.ibm.com/partnerworld/page/cloud-marketplace-reseller-onboarding   

Please visit the Documents Tab for a Presentation of the step by step process.

Children's literature can be traced to stories and songs, part of a wider oral tradition, that adults shared with children before publishing existed. The development of early children's literature, before printing was invented, is difficult to trace. Even after printing became widespread, many classic "children's" tales were originally created for adults and later adapted for a younger audience. Since the fifteenth century much literature has been aimed specifically at children, often with a moral or religious message. The late nineteenth and early twentieth centuries is known as the "Golden Age of Children's Literature", because many classic children's books were published then.
Children's literature can be traced to stories and songs, part of a wider oral tradition, that adults shared with children before publishing existed. The development of early children's literature, before printing was invented, is difficult to trace. Even after printing became widespread, many classic "children's" tales were originally created for adults and later adapted for a younger audience. Since the fifteenth century much literature has been aimed specifically at children, often with a moral or religious message. The late nineteenth and early twentieth centuries is known as the "Golden Age of Children's Literature", because many classic children's books were published then.
Image
Image
Image

TV Commercial.

Marketing Collaterals.

Date

29 May 2019

Tags

Cloud Services