SlideShare una empresa de Scribd logo
1 de 24
© 2012 IBM Corporation1
Put your business in motion
Twitter: @IBMMobileUK
Benjamin Lowe – Service Management Channel Lead UK&I (IBM Software Group)
© 2012 IBM Corporation2
Five trends with significant implications for the enterprise
Mobile is about transacting
1
96% year to year increase in mobile cyber Monday sales between 2012 and 2011
Mobile enables the Internet of Things
91% of mobile users keep their device within arm’s reach 100% of the time
2
4
3
Mobile is primary
5
90% of users use multiple screens as channels come together to create integrated
experiences
Mobile must create a continuous brand experience
Global Machine-to-machine connections will increase from 2 billion in 2011 to 18
billion at the end of 2022
Insights from mobile data provide new opportunities
75% of mobile shoppers take action after receiving a location based messages
2
1. Source: “China Mobile 50k survey”; Morgan Stanley Research
2. JiWire Mobile Audience Insights Report Q42011
3.IBM Coremetrics Retail Data – as published in 24/11/12 IBM Press Release
4. IBM Global Technology Outlook 2013, Google
5. GSMA, Machina Research
© 2012 IBM Corporation3
IBM has been building mobile enterprise capabilities
200+ IBM Software apps
available in App Stores;
~ 1M downloads
Cited as a leader in app design
and managed services by
Forrester and Gartner
10 acquisitions to strengthen
our position since 2006
125+ patents for wireless in
2012, bringing total to 270
Doubling 2013
investment
© 2012 IBM Corporation4
The IBM MobileFirst offering portfolio
AnalyticsSecurityManagement
IBM and Partner Applications
Application Platform and Data Services
Banking Insurance Transport Telecom Government
Industry Solutions
HealthcareRetail Automotive
Application & Data Platform
Strategy&DesignServices
Development&IntegrationServices
Cloud & Managed Services
Devices Network Servers
© 2012 IBM Corporation5
IBM MobileFirst Platform
IBM Worklight
IBM Rational Test Workbench
IBM Mobile Application Platform Management
• Automated testing for high quality mobile
apps (planned beta in 1Q)
• Streamlined deployment for private
clouds on PureApplication System
• Single sign-on across multiple apps on a
device
• Latest versions of all major mobile OS’s
(iOS, Android, Windows, and BlackBerry)
For clients that need to:
 Quickly develop and deploy high quality
mobile apps across multiple platforms
 Seamlessly connect rich mobile
applications to enterprise data and
services
IBM MobileFirst Platform offers:
 Native, web, or hybrid app development
 Tools to build & test high quality apps for many
devices
 Management, security, continuous delivery &
distribution of apps
 Easy connectivity to existing data & services
for mobile usage
 On-premises or managed service delivery
Available Today!
© 2012 IBM Corporation6
IBM MobileFirst Management
*Planned availability in 1Q 2013
For Clients That Need To:
 Implement BYOD with confidence
 Manage secure sensitive data, regardless
of the device
 Handle multi-platform complexities
with ease
IBM MobileFirst Management Offers:
 Unified management across devices
 Option to wipe corporate data
 Configuration & enforcement of password
policies, encryption, VPN access & camera use
 Streamlined workflow between
development & operations with an
integrated Enterprise App Store
 On-premises or managed service delivery
IBM Endpoint Manager for Mobile Devices
IBM Enterprise Services Managed Mobility
IBM Mobile and Wireless Network Management
Available Today!
• Latest versions of all major mobile OS’s
(iOS, Android, Windows, and BlackBerry)
• Defense-grade encryption
thru FIPS 140-2 compliance*
• Automatically grant or deny email access
based on device compliance
• Ease admin by setting and reporting
IBM Notes Traveler security policies
© 2012 IBM Corporation7
IBM MobileFirst Security
For Clients That Need To:
 Protect devices and data
 Defend the network
 Ensure secure access
 Safeguard mobile apps
 Preserve user experience without
compromising security
IBM MobileFirst Security Offers:
 Context aware risk-based access control
 Mobile threat protection
 Strong session management & Single Sign-on
 Vulnerability analysis for mobile apps
 Visibility and analysis of security events from
the device, network, user and app behavior
IBM Security Access Manager for Mobile and Cloud
IBM AppScan
*Planned availability in 1Q 2013
Available Today!
• State-of-the-art high-quality vulnerability
analysis for mobile apps
• Native support extended for iOS
to accelerate enterprise usage*
• Enhanced support for JavaScript analysis
in hybrid mobile apps*
• Out-of-the-box support for IBM Worklight
built apps to incorporate context aware
risk-based access
© 2012 IBM Corporation8
IBM MobileFirst Analytics
For Clients That Need To:
 Optimize digital & mobile experiences
to drive online conversion
 Analyze mobile behaviors and quantify
business impact of user struggles
 Improve customer service resolution
and drive loyalty
IBM MobileFirst Analytics Offers:
 Automatic detection of customer issues
through user and mobile device data
 User behavior drill down with high fidelity
replay & reporting of the user experience
 Correlated customer behavior with network
and application data
 High conversion and retention rates with
quantifiable business impact analysis
Tealeaf CX Mobile
Available Today!
• Capture and high-fidelity replay of
mobile gestures* for mobile web
sessions on iOS and Android-based
devices
• Add-on Heatmap, Link Analytics, Form
Analytics, and Attention Maps for
better understanding of users’ intent
through highly visual analytics**
© 2012 IBM Corporation9
IBM was positioned as a leader in the Forrester WaveTM
:
Enterprise Mobility Services, Q1 2013
IBM received the highest score possible in “Current Offering”
Source: Forrester Research Inc. “Forrester WaveTM
”: Enterprise Mobility Services, Q1 2013”.
Full report can be accessed at http://www.ibm.com
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of
Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the
Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
© 2012 IBM Corporation
IBM Endpoint Manager – Unified Device Management
The first step to your BYOD journey
© 2012 IBM Corporation11
61%of CIOs put
mobile as priority
increased productivity
with mobile apps45%
10 Billiondevices
by 2020
BYOD and Mobile is a mandatory transformation
© 2012 IBM Corporation12
IBM Endpoint Manager, Built on BigFix Technology:
The Power of One
© 2012 IBM Corporation1313
Security in a constantly changing distributed cloud world
Find all assets on your
network – NOW
Deploy a software
application worldwide
in days.
Patch hundreds of
thousands of physical and
virtual workstations,
laptops and servers in
minutes.
Continuously enforce
security configuration
baselines, even on
mobile and off-network
devices to protect your
cloud.
Patch anywhere,
anytime over any
network.
© 2012 IBM Corporation14
Single Server & Console
• Highly secure, highly scalable
• Aggregates data, analyzes & reports
• Pushes out pre-defined/custom policies
Cloud-based Content Delivery
• Highly extensible
• Automatic, on-demand functionality
Single Intelligent Agent
• Performs multiple functions
• Continuous self-assessment & policy enforcement
• Minimal system impact (< 2% CPU)
Lightweight, Robust Infrastructure
• Use existing systems as Relays
• Built-in redundancy
• Support/secure roaming endpoints
IBM Endpoint Manager : Secret Sauce….
© 2012 IBM Corporation15
Patch as quickly as you can provision…
Our Closed Loop Speed is Our Advantage
Report Publish
Evaluate
Traditional Solutions IBM Endpoint Manager
Enforce Evaluate
PublishReport
Challenge Traditional client/server tools IBM Endpoint Manager Platform
Complete the policy enforcement
loop
Everything is controlled by the
server, which is slow
Distributed computing with
intelligent, universal agent
Increase the accuracy and speed
of your knowledge
It can take days to accurately close
the enforcement loop
Policy enforcement is accomplished
and proven in minutes instead of
days
Scalability cannot be attained
without large infrastructure
investments
Administrators are still managing
tools instead of being productive
Distributed processing means
scalability is unlimited
Adjust system policies depending
on environment, location
Scan-based assessment, leading to
stale data false sense of awareness
Real-time situational awareness
Decide
Evaluate
Enforce
Decide
15
IBM
Endpoint
Manager
© 2012 IBM Corporation16
This means you can…
 Push 96 Microsoft patches to 10,000 endpoints
within 24 hours
 Achieve 98% first pass patch success rate in hours
 Reduce patch management FTE costs by 20 to one
 Distribute patches and software updates to
endpoints around the globe…within 15 minutes
 Deploy endpoint management to 500,000+
endpoints in six months, decreasing security issues
by 78% in one quarter
16
IBM
Endpoint
Manager
© 2012 IBM Corporation17
IBM Endpoint Manager and endpoint compliance
17
Compliance vs. baseline
© 2012 IBM Corporation1818
IBM Endpoint Manager Value Across the Organization
IT Operations IT Security and
Compliance
Facilities
Unified Endpoint Management
IT Asset
Management
Mobile
Workforce
• Attain real-time
visibility and control
• Network discovery
• Managed endpoint
hardware inventory
• Managed endpoint
software inventory
• Software use analysis
to reclaim under-used
applications
• PC software license
compliance analysis
• Compress patch
cycles to minutes or
hours with 98-99%
first pass success
• Patch 90+ OS
versions and popular
3rd
party Windows
applications
• Software distribution
• OS deployment
• Remote control
• Server management
• Ensure continuous
compliance across all
endpoints, regardless of
location or network
connectivity
• Security configuration
baselines
• Vulnerability
assessment
• Network self-quarantine
• Personal firewall
• Multi-vendor anti-
malware management
• Endpoint protection
• Data loss prevention /
device control
• Reduce annual
electricity costs by
$20-$50 per PC/Mac
• Wake-on-LAN
• Current power usage
baselines and savings
models
• Enable password
policies and device
encryption
• Force encrypted
backup
• Disable iCloud sync
• Access to corporate
email, apps, VPN,
WiFi contingent on
policy compliance
• Selectively wipe
corporate data if
employee leaves
company
• Fully wipe if device is
lost or stolen
Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server
7 versions of Linux • iOS • Android • Symbian • Windows Mobile / Phone
1 console, 1 agent, 1 server: 250,000 endpoints, 90+ OS versions!
20th November
© 2012 IBM Corporation19
 Device inventory
 Security policy mgmt
 Application mgmt
 Device config (VPN/Email/Wifi)
 Encryption mgmt
 Roaming device support
 Integration with internal systems
 Scalable/Secure solution
 Easy-to-deploy
 Multiple OS support
 Consolidated infrastructure
 Device Wipe
 Data Wipe (full OR
partial)
 Location info
 Jailbreak/Root
detection
 Enterprise App store
 Self-service portal
 OS provisioning
 Patching
 Power Mgmt
 Anti-Virus Mgmt
Traditional Endpoint Management Mobile Device Management
IBM & Business Partner Confidential
© 2012 IBM Corporation20
20
Exposures Discovered – Customer Example
– 189 software programs installed
– 115 remained inactive in the analysis time period
– 20 were accessed less than 10 times.
– Desktop estate, Monday 17th
October, machines were,
– Inactive for a total of 14.93 hours
– Active for an average of 4.37 hours
– Switched off for only 4.65 hours
– 1.3% of endpoints, compliant with the critical Microsoft patches
– 188,736 OS vulnerabilities across these systems
– 143,489 high vulnerability classification by Microsoft
– <20% of all hard drive space is used on the average system
– No anti-virus on 25 machines
– 54 machines out of date virus definitions
– 7 machines have turned anti-virus off
– 12 running two types of AV
– >90% of machines need a critical Adobe patch
– >85% of machines require a critical Java patch
– >88% of machines need a critical Quicktime patch
© 2012 IBM Corporation21
21
Key Positioning Strategy: Tip of the Spear
 Rather than sell everything, sell to the principal pain. Are there patching issues
with a competitor? Compliance across roaming devices? Visibility of the latest
installed software?
 Stay focused on the most critical requirement/functionality. Don’t position the
whole product as whole if not required.
 Our sellers have been most successful when using three easy steps:
1. Propose a single product: Patch Management or Power Management a
strong intro
2. Get the platform installed in hours,
see value in days/weeks. Custom content creation.
3. Return for cross-sell opportunities when customer
sees the value of the product themselves!
© 2012 IBM Corporation22
22
Key Selling Strategy: Pitfalls to avoid
• Feature-by-feature comparisons
– Devalues the power of our platform
– Usually it’s the customer trying to get us
to do their homework…
– Doesn’t link to what the customer cares about
• The “religious IT master”
– The Microsoft-certified-emblazoned
business card
– Or…“I love appliances, why don’t
you have one?”
• Making absolute statements about the other
guys – quickly destroys your credibility
© 2012 IBM Corporation23
Identifying Competitive Opportunities
1. Prospect is unhappy with
existing solution
– Highly typical
– Push for POC / pilot to prove value and expand
2. Compelling events
– Zero-day scenarios
– Power management projects
– Compliance audit failures/SLA issues
3. Look for co-existence as well as displacement opportunities
– e.g. SCCM + BigFix
23
© 2012 IBM Corporation24
Legal Disclaimer
• © IBM Corporation 2011. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM
Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server).
Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your
presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in
your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International
Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other
countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of
others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
purposes only.

Más contenido relacionado

La actualidad más candente

Why Mobile will Change your Business - Parmelee
Why Mobile will Change your Business - ParmeleeWhy Mobile will Change your Business - Parmelee
Why Mobile will Change your Business - ParmeleeProlifics
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise MobilityMatthew David
 
Enterprise mobility services
Enterprise mobility servicesEnterprise mobility services
Enterprise mobility servicesNet Solutions
 
IBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsIBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsLeigh Williamson
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM Events
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platformNitin Gaur
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7ibmmobile
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaDeivid Toledo
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionFolio3 Software
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Sophie Jasson-Holt
 
Ibm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcIbm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcSaranga Tripathy
 

La actualidad más candente (18)

Why Mobile will Change your Business - Parmelee
Why Mobile will Change your Business - ParmeleeWhy Mobile will Change your Business - Parmelee
Why Mobile will Change your Business - Parmelee
 
5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility5 Steps for Enterprise Mobility
5 Steps for Enterprise Mobility
 
Enterprise mobility services
Enterprise mobility servicesEnterprise mobility services
Enterprise mobility services
 
IBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst ApplicationsIBM InterConnect Build and Deploy MobileFirst Applications
IBM InterConnect Build and Deploy MobileFirst Applications
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
Ibm mobilefirst overview presentation
Ibm mobilefirst overview presentationIbm mobilefirst overview presentation
Ibm mobilefirst overview presentation
 
Bluemix digital innovation_platform
Bluemix digital innovation_platformBluemix digital innovation_platform
Bluemix digital innovation_platform
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Enterprise Mobility - An Introduction
Enterprise Mobility - An IntroductionEnterprise Mobility - An Introduction
Enterprise Mobility - An Introduction
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
 
Ibm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mcIbm mobile first platform presentation refresh 05 18-mc
Ibm mobile first platform presentation refresh 05 18-mc
 

Similar a Put your mobile business in motion

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...Nitin Gaur
 
Impact 2014 The Mobile Enterprise
Impact 2014 The Mobile EnterpriseImpact 2014 The Mobile Enterprise
Impact 2014 The Mobile EnterpriseAndrew Coleman
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionDalia Reda
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
2013 Good Design is Good Business - Mobile
2013 Good Design is Good Business - Mobile2013 Good Design is Good Business - Mobile
2013 Good Design is Good Business - MobileRoger Snook
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 20153GDR
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM (Middle East and Africa)
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomyDATAVERSITY
 
IBM MobileFirst and developerworks
IBM MobileFirst and developerworksIBM MobileFirst and developerworks
IBM MobileFirst and developerworksDirk Nicol
 
DevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationDevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationLeigh Williamson
 
Webinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsWebinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsSynoptek (previously Indusa)
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationLeigh Williamson
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend
 
Mobile Strategy Guide
Mobile Strategy GuideMobile Strategy Guide
Mobile Strategy GuideDirk Nicol
 

Similar a Put your mobile business in motion (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
IBM MobileFirst - Agile Application Infrastructure New Paradigm for new Workl...
 
Impact 2014 The Mobile Enterprise
Impact 2014 The Mobile EnterpriseImpact 2014 The Mobile Enterprise
Impact 2014 The Mobile Enterprise
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
IBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motionIBM Mobili First - IBM Business Connect QatarPut your business in motion
IBM Mobili First - IBM Business Connect QatarPut your business in motion
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
2013 Good Design is Good Business - Mobile
2013 Good Design is Good Business - Mobile2013 Good Design is Good Business - Mobile
2013 Good Design is Good Business - Mobile
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
 
IBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essentialIBM Software Day 2013. A mobile strategy is essential
IBM Software Day 2013. A mobile strategy is essential
 
SmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App EconomySmartData Webinar: Cognitive Computing in the Mobile App Economy
SmartData Webinar: Cognitive Computing in the Mobile App Economy
 
IBM MobileFirst and developerworks
IBM MobileFirst and developerworksIBM MobileFirst and developerworks
IBM MobileFirst and developerworks
 
DevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentationDevBeat 2013 IBM Master Class presentation
DevBeat 2013 IBM Master Class presentation
 
Webinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsWebinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile Apps
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Pulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentationPulse 2013 Mobile Build and Connect presentation
Pulse 2013 Mobile Build and Connect presentation
 
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetegaPrimend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
Primend Pilvekonverents - Mobiilne ettevõte mobiilsete andmetega
 
Mobile Strategy Guide
Mobile Strategy GuideMobile Strategy Guide
Mobile Strategy Guide
 

Más de Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

Más de Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Put your mobile business in motion

  • 1. © 2012 IBM Corporation1 Put your business in motion Twitter: @IBMMobileUK Benjamin Lowe – Service Management Channel Lead UK&I (IBM Software Group)
  • 2. © 2012 IBM Corporation2 Five trends with significant implications for the enterprise Mobile is about transacting 1 96% year to year increase in mobile cyber Monday sales between 2012 and 2011 Mobile enables the Internet of Things 91% of mobile users keep their device within arm’s reach 100% of the time 2 4 3 Mobile is primary 5 90% of users use multiple screens as channels come together to create integrated experiences Mobile must create a continuous brand experience Global Machine-to-machine connections will increase from 2 billion in 2011 to 18 billion at the end of 2022 Insights from mobile data provide new opportunities 75% of mobile shoppers take action after receiving a location based messages 2 1. Source: “China Mobile 50k survey”; Morgan Stanley Research 2. JiWire Mobile Audience Insights Report Q42011 3.IBM Coremetrics Retail Data – as published in 24/11/12 IBM Press Release 4. IBM Global Technology Outlook 2013, Google 5. GSMA, Machina Research
  • 3. © 2012 IBM Corporation3 IBM has been building mobile enterprise capabilities 200+ IBM Software apps available in App Stores; ~ 1M downloads Cited as a leader in app design and managed services by Forrester and Gartner 10 acquisitions to strengthen our position since 2006 125+ patents for wireless in 2012, bringing total to 270 Doubling 2013 investment
  • 4. © 2012 IBM Corporation4 The IBM MobileFirst offering portfolio AnalyticsSecurityManagement IBM and Partner Applications Application Platform and Data Services Banking Insurance Transport Telecom Government Industry Solutions HealthcareRetail Automotive Application & Data Platform Strategy&DesignServices Development&IntegrationServices Cloud & Managed Services Devices Network Servers
  • 5. © 2012 IBM Corporation5 IBM MobileFirst Platform IBM Worklight IBM Rational Test Workbench IBM Mobile Application Platform Management • Automated testing for high quality mobile apps (planned beta in 1Q) • Streamlined deployment for private clouds on PureApplication System • Single sign-on across multiple apps on a device • Latest versions of all major mobile OS’s (iOS, Android, Windows, and BlackBerry) For clients that need to:  Quickly develop and deploy high quality mobile apps across multiple platforms  Seamlessly connect rich mobile applications to enterprise data and services IBM MobileFirst Platform offers:  Native, web, or hybrid app development  Tools to build & test high quality apps for many devices  Management, security, continuous delivery & distribution of apps  Easy connectivity to existing data & services for mobile usage  On-premises or managed service delivery Available Today!
  • 6. © 2012 IBM Corporation6 IBM MobileFirst Management *Planned availability in 1Q 2013 For Clients That Need To:  Implement BYOD with confidence  Manage secure sensitive data, regardless of the device  Handle multi-platform complexities with ease IBM MobileFirst Management Offers:  Unified management across devices  Option to wipe corporate data  Configuration & enforcement of password policies, encryption, VPN access & camera use  Streamlined workflow between development & operations with an integrated Enterprise App Store  On-premises or managed service delivery IBM Endpoint Manager for Mobile Devices IBM Enterprise Services Managed Mobility IBM Mobile and Wireless Network Management Available Today! • Latest versions of all major mobile OS’s (iOS, Android, Windows, and BlackBerry) • Defense-grade encryption thru FIPS 140-2 compliance* • Automatically grant or deny email access based on device compliance • Ease admin by setting and reporting IBM Notes Traveler security policies
  • 7. © 2012 IBM Corporation7 IBM MobileFirst Security For Clients That Need To:  Protect devices and data  Defend the network  Ensure secure access  Safeguard mobile apps  Preserve user experience without compromising security IBM MobileFirst Security Offers:  Context aware risk-based access control  Mobile threat protection  Strong session management & Single Sign-on  Vulnerability analysis for mobile apps  Visibility and analysis of security events from the device, network, user and app behavior IBM Security Access Manager for Mobile and Cloud IBM AppScan *Planned availability in 1Q 2013 Available Today! • State-of-the-art high-quality vulnerability analysis for mobile apps • Native support extended for iOS to accelerate enterprise usage* • Enhanced support for JavaScript analysis in hybrid mobile apps* • Out-of-the-box support for IBM Worklight built apps to incorporate context aware risk-based access
  • 8. © 2012 IBM Corporation8 IBM MobileFirst Analytics For Clients That Need To:  Optimize digital & mobile experiences to drive online conversion  Analyze mobile behaviors and quantify business impact of user struggles  Improve customer service resolution and drive loyalty IBM MobileFirst Analytics Offers:  Automatic detection of customer issues through user and mobile device data  User behavior drill down with high fidelity replay & reporting of the user experience  Correlated customer behavior with network and application data  High conversion and retention rates with quantifiable business impact analysis Tealeaf CX Mobile Available Today! • Capture and high-fidelity replay of mobile gestures* for mobile web sessions on iOS and Android-based devices • Add-on Heatmap, Link Analytics, Form Analytics, and Attention Maps for better understanding of users’ intent through highly visual analytics**
  • 9. © 2012 IBM Corporation9 IBM was positioned as a leader in the Forrester WaveTM : Enterprise Mobility Services, Q1 2013 IBM received the highest score possible in “Current Offering” Source: Forrester Research Inc. “Forrester WaveTM ”: Enterprise Mobility Services, Q1 2013”. Full report can be accessed at http://www.ibm.com The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
  • 10. © 2012 IBM Corporation IBM Endpoint Manager – Unified Device Management The first step to your BYOD journey
  • 11. © 2012 IBM Corporation11 61%of CIOs put mobile as priority increased productivity with mobile apps45% 10 Billiondevices by 2020 BYOD and Mobile is a mandatory transformation
  • 12. © 2012 IBM Corporation12 IBM Endpoint Manager, Built on BigFix Technology: The Power of One
  • 13. © 2012 IBM Corporation1313 Security in a constantly changing distributed cloud world Find all assets on your network – NOW Deploy a software application worldwide in days. Patch hundreds of thousands of physical and virtual workstations, laptops and servers in minutes. Continuously enforce security configuration baselines, even on mobile and off-network devices to protect your cloud. Patch anywhere, anytime over any network.
  • 14. © 2012 IBM Corporation14 Single Server & Console • Highly secure, highly scalable • Aggregates data, analyzes & reports • Pushes out pre-defined/custom policies Cloud-based Content Delivery • Highly extensible • Automatic, on-demand functionality Single Intelligent Agent • Performs multiple functions • Continuous self-assessment & policy enforcement • Minimal system impact (< 2% CPU) Lightweight, Robust Infrastructure • Use existing systems as Relays • Built-in redundancy • Support/secure roaming endpoints IBM Endpoint Manager : Secret Sauce….
  • 15. © 2012 IBM Corporation15 Patch as quickly as you can provision… Our Closed Loop Speed is Our Advantage Report Publish Evaluate Traditional Solutions IBM Endpoint Manager Enforce Evaluate PublishReport Challenge Traditional client/server tools IBM Endpoint Manager Platform Complete the policy enforcement loop Everything is controlled by the server, which is slow Distributed computing with intelligent, universal agent Increase the accuracy and speed of your knowledge It can take days to accurately close the enforcement loop Policy enforcement is accomplished and proven in minutes instead of days Scalability cannot be attained without large infrastructure investments Administrators are still managing tools instead of being productive Distributed processing means scalability is unlimited Adjust system policies depending on environment, location Scan-based assessment, leading to stale data false sense of awareness Real-time situational awareness Decide Evaluate Enforce Decide 15 IBM Endpoint Manager
  • 16. © 2012 IBM Corporation16 This means you can…  Push 96 Microsoft patches to 10,000 endpoints within 24 hours  Achieve 98% first pass patch success rate in hours  Reduce patch management FTE costs by 20 to one  Distribute patches and software updates to endpoints around the globe…within 15 minutes  Deploy endpoint management to 500,000+ endpoints in six months, decreasing security issues by 78% in one quarter 16 IBM Endpoint Manager
  • 17. © 2012 IBM Corporation17 IBM Endpoint Manager and endpoint compliance 17 Compliance vs. baseline
  • 18. © 2012 IBM Corporation1818 IBM Endpoint Manager Value Across the Organization IT Operations IT Security and Compliance Facilities Unified Endpoint Management IT Asset Management Mobile Workforce • Attain real-time visibility and control • Network discovery • Managed endpoint hardware inventory • Managed endpoint software inventory • Software use analysis to reclaim under-used applications • PC software license compliance analysis • Compress patch cycles to minutes or hours with 98-99% first pass success • Patch 90+ OS versions and popular 3rd party Windows applications • Software distribution • OS deployment • Remote control • Server management • Ensure continuous compliance across all endpoints, regardless of location or network connectivity • Security configuration baselines • Vulnerability assessment • Network self-quarantine • Personal firewall • Multi-vendor anti- malware management • Endpoint protection • Data loss prevention / device control • Reduce annual electricity costs by $20-$50 per PC/Mac • Wake-on-LAN • Current power usage baselines and savings models • Enable password policies and device encryption • Force encrypted backup • Disable iCloud sync • Access to corporate email, apps, VPN, WiFi contingent on policy compliance • Selectively wipe corporate data if employee leaves company • Fully wipe if device is lost or stolen Microsoft Windows • Mac OSX • IBM AIX • HP-UX • Solaris • VMWare ESX Server 7 versions of Linux • iOS • Android • Symbian • Windows Mobile / Phone 1 console, 1 agent, 1 server: 250,000 endpoints, 90+ OS versions! 20th November
  • 19. © 2012 IBM Corporation19  Device inventory  Security policy mgmt  Application mgmt  Device config (VPN/Email/Wifi)  Encryption mgmt  Roaming device support  Integration with internal systems  Scalable/Secure solution  Easy-to-deploy  Multiple OS support  Consolidated infrastructure  Device Wipe  Data Wipe (full OR partial)  Location info  Jailbreak/Root detection  Enterprise App store  Self-service portal  OS provisioning  Patching  Power Mgmt  Anti-Virus Mgmt Traditional Endpoint Management Mobile Device Management IBM & Business Partner Confidential
  • 20. © 2012 IBM Corporation20 20 Exposures Discovered – Customer Example – 189 software programs installed – 115 remained inactive in the analysis time period – 20 were accessed less than 10 times. – Desktop estate, Monday 17th October, machines were, – Inactive for a total of 14.93 hours – Active for an average of 4.37 hours – Switched off for only 4.65 hours – 1.3% of endpoints, compliant with the critical Microsoft patches – 188,736 OS vulnerabilities across these systems – 143,489 high vulnerability classification by Microsoft – <20% of all hard drive space is used on the average system – No anti-virus on 25 machines – 54 machines out of date virus definitions – 7 machines have turned anti-virus off – 12 running two types of AV – >90% of machines need a critical Adobe patch – >85% of machines require a critical Java patch – >88% of machines need a critical Quicktime patch
  • 21. © 2012 IBM Corporation21 21 Key Positioning Strategy: Tip of the Spear  Rather than sell everything, sell to the principal pain. Are there patching issues with a competitor? Compliance across roaming devices? Visibility of the latest installed software?  Stay focused on the most critical requirement/functionality. Don’t position the whole product as whole if not required.  Our sellers have been most successful when using three easy steps: 1. Propose a single product: Patch Management or Power Management a strong intro 2. Get the platform installed in hours, see value in days/weeks. Custom content creation. 3. Return for cross-sell opportunities when customer sees the value of the product themselves!
  • 22. © 2012 IBM Corporation22 22 Key Selling Strategy: Pitfalls to avoid • Feature-by-feature comparisons – Devalues the power of our platform – Usually it’s the customer trying to get us to do their homework… – Doesn’t link to what the customer cares about • The “religious IT master” – The Microsoft-certified-emblazoned business card – Or…“I love appliances, why don’t you have one?” • Making absolute statements about the other guys – quickly destroys your credibility
  • 23. © 2012 IBM Corporation23 Identifying Competitive Opportunities 1. Prospect is unhappy with existing solution – Highly typical – Push for POC / pilot to prove value and expand 2. Compelling events – Zero-day scenarios – Power management projects – Compliance audit failures/SLA issues 3. Look for co-existence as well as displacement opportunities – e.g. SCCM + BigFix 23
  • 24. © 2012 IBM Corporation24 Legal Disclaimer • © IBM Corporation 2011. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.

Notas del editor

  1. MAIN POINT: Mobile is a big opportunity SPEAKER NOTES: There is a lot of compelling data in the marketplace, but we have identified 5 key trends or observations – supported by market data and by customer successes – that we believe have strong implications for the future of mobile. Mobile is about transacting. Whether shopping, purchasing, searching for or providing information, collaborating or seeking service, mobile enabled people and objects are seeking not simply to connect, but to complete tasks when, where and how they wish. As they transact they are creating vast streams of data that, with the right analytics, can teach us things about their behavior and their preferences that we could not learn in any other way. Mobile is the universal sensor. It is with most of us 100% of the time and is the primary means we use to interact with our employers, our customers, our family and our friends. But at the same time, the mobile experience must transcend any single device to accommodate multiple screens and touchpoints. The experience has to be consistent across channels, touchpoints and time. Finally, as we think about mobile, we can’t confine our thinking to devices like phones and tablets. The ability to tag things, sense things, power things and shrink things has extended mobility beyond people to nearly every other type of object on the planet. As we have said since the start of smarter planet things are becoming more instrumented, interconnected and intelligent than every before, and mobile is right at the center of that story. and will fundamentally change the way the world works. Sources: 1. Source: “China Mobile 50k survey”; Morgan Stanley Research; 2011 2. JiWire Mobile Audience Insights Report Q42011 3.IBM Coremetrics Retail Data – as published in 11/24/12 IBM Press Release 4. Time, Inc. 2012 5. GSMA, Machina Research
  2. MAIN POINT: We have made strong progress in Mobile since the completion of our purchase of Worklight, just a year ago. Investment that went to Pure a year ago, is now coming to Mobile. SPEAKER NOTES: Throughout 2012 IBM has made significant progress in Mobile through a variety of acquisitions, investment and organic growth. We started 2012 with acquisition of Worklight which filled a key gap in our capability set and enables our clients to deliver rich mobile applications on a multitude of platforms. We released a new packaged offering to the market in IBM Mobile Foundation, launched several mobile service offerings along with several updated software offerings including IBM Mobile Connect and IBM Mobile Development Lifecycle Solution. In 2012, we also completed the acquisition of Tealeaf CX which provides important capabilities to drive analytics for mobile. Throughout the year we pulled together our comprehensive set of software and services capabilities and brought our IBM capability story to the market with the message that IBM has a broad set of capabilities to help clients build and connect mobile applications, manage and secure mobile devices, apps and data while extending their core capabilities to their employees and customers while transforming their mobile business.  Devices under management: GTS has 250,000 client devices + 120,000 IBM devices under management. we are told by analysts that that is the largest number of any services provider, but that&apos;s not a public statement http://www.computerworld.com/s/article/9225563/IBM_CIO_discusses_Big_Blue_39_s_BYOD_strategy Mobile Business Partners (WIP): 216 Sis partners other brands (working to obtain cross company and de-dup against current list) 120 ISVs 30+ across (team is working on the target) Mobile DeveloperWorks community Confirmed the traffic with the community owner. http://www.ibm.com/developerworks/mobile/   *In May 2012, from GBS: IBM Interactive was ranked in Top 10 Latest Agencies by Ad Age *In October 2012, from GTS released two services offerings Consulting and managed mobility services and Mobile Application Platform Management services  
  3. MAIN POINT: Today we are launching a new IBM Mobile offering portfolio SPEAKER NOTES: Today IBM we are re-launching our mobile offering portfolio to provide customers with an end to end set of offerings to help them embrace mobile first. We will approach the marketplace with a series of solutions led by GBS that are industry oriented. We have agreement with GBS on the three most important usecases in each industry, which we will discuss in greater detail on the next chart. GBS will lead the dialogue around the transformation and we will the offer a range of HW and SW mobile enabled solutions to support the transformation. Today on the app store there are over 200 IBM Software packages that have mobile enabled clients. We also have mobile enabled services that you can get from the smart cloud. Across the bottom of the chart, you will see how we will broaden the concept around the IBM MobileFirst Platform. When we launch the new brand it will include the mobile application development platform. Today that is known as Worklight. We will have mobile analytics which is known as Tealeaf today. We have mobile security – which is managed today by app scan, ISAM and other products in the security portfolio. And we have mobile management – which today is mobile endpoint manager. These products will integrate to provide a seamless suit of capabilities. In addition, on the left, bottom and right hand side you see a set of strategy &amp; design services, cloud &amp; managed services, and development &amp;integration services. Our colleagues in GTS and GBS have a set of services around mobile management, mobile application development and lifecycle management among others. And all of this will run on the cloud operating environment which enables customer to consume the solutions either on premise or in the cloud.
  4. (iOS, Android, Windows, and BlackBerry)
  5. (iOS, Android, Windows, and BlackBerry)
  6. (iOS, Android, Windows, and BlackBerry)
  7. * Mobile gestures such as zoom in/out, pinch in/out, scroll left/right and orientation change ** Requires integration with additional Tealeaf CX products
  8. Single agent, single server so.. Extreme Scale Extreme Speed (impl, exec, remed) + VISIBILITY TO EDGE Heterogeneous, Distributed networks. Proactive V ’ s Reactive. ZERO DAY TO SEMI STRUCTURED. Converging Security and System Management JOBURG EXAMPLE + LAPTOP AND PHONE QUESTION
  9. MIXED BANDWIDTH, MIXED DEVICES, INTERMITANTLY CONNECTED. WE ARE RADICALLY DIFFERENT FROM EVERYONE ELSE. CUSTOMER HQ AND NICE PRIOR HISTORIC PERIMETER BASED SECURITY MODEL. NO LONGER EXISTS AND OLD TECH BREAKS IN THE NEW WORLD! AGENTS ARE SMART AND ENFORCE POLICY, NOT SERVER SCAN BASED. (NAME/ CINEMA EXAMPLE). CDN LIKE POINT FOR CACHING. Most enterprise networks are highly distributed.  Users are connecting to your HQ site from across the Internet, while on the road, and also from remote offices – which makes security and systems management extremely challenging.  Additionally, most enterprise networks have bandwidth constraints – over wireless, shared MPLS, satellite links, etc - which makes pushing fat software packages and security patches over these latency-prone links a huge burden for the IT organization.  Moreover, many of these devices are intermittently connected – particularly those roaming laptops – which makes validating and updating their configuration virtually impossible. Finally, most enterprises have many different types of servers, desktops, laptops and handheld devices, making cross-platform support a must for any security and systems management solution. Unlike alternative solutions, BigFix was purpose-built to work efficiently within these types of environments.  As you can see from the diagram, BigFix Agents can be deployed on all types of devices, whether those are running Windows, Windows Mobile, different flavors of UNIX, Linux and Mac.  The BigFix Agent is the “brains” of the BigFix Unified Management Platform and continuously assesses the state of the endpoint against policy, whether connected to the network or not.  As soon as it notices that an endpoint is out of compliance with a policy or checklist, it informs the BigFix server and executes the configured remediation strategy, and immediately notifies the BigFix Server of task status (completed, in process, not completed). The BigFix Server manages policy content – delivered in messages called “ BigFix Fixlets ” and updated continuously via the BigFix Content Delivery cloud-based service – and enables the BigFix Operator to maintain real-time visibility and control over all devices in the environment – including instantaneous discovery of devices that aren ’ t managed by BigFix.  Because most of the analysis, processing and enforcement work is done by the BigFix Agent rather than the Server, ONE BigFix Server can support more than 200K endpoints, enabling customers to make the most of their security and systems management investment.  Whatever specific BigFix solution a customer uses – whether it ’ s endpoint protection, systems lifecycle management or security configuration and vulnerability management – it ’ s delivered via a single management console view. Additionally, new services can be provisioned and delivered via the BigFix Content Delivery cloud with no additional hardware or software installations or network changes. Deployment is straightforward, and is typically completed within hours or days. Agents can automatically be installed within minutes, without disrupting end-users.   Additionally, most customers deploy BigFix Relays to help manage distributed devices and policy content and as you can see in the diagram – an existing workstation can be leveraged for this purpose.  Promoting an Agent to a Relay takes minutes and doesn ’ t require dedicated hardware or network configuration changes.   It ’ s entirely up to the customer how many Relays to deploy and where they ’ d like to place them; however, we can certainly make recommendations based on business and technical considerations.  In addition to caching patches and other software updates close to end user devices, BigFix Relays manage the bandwidth used by BigFix to ensure that systems and security management tasks don ’ t consume all available network bandwidth. To a world accustomed to multiple, fragmented technologies and point solutions, BigFix offers an alternative: the industry ’ s only single-console, single-agent platform that addresses operations, security and compliance initiatives in real-time and at global scale. HIGHLY EXTENSIBLE – AUTO ON DEMAND FUNCTIONALITY ADD WITH JUST SWITCH ON CONTENT. Most enterprise networks are highly distributed.  Users are connecting to your HQ site from across the Internet, while on the road, and also from remote offices – which makes security and systems management extremely challenging.  Additionally, most enterprise networks have bandwidth constraints – over wireless, shared MPLS, satellite links, etc - which makes pushing fat software packages and security patches over these latency-prone links a huge burden for the IT organization.  Moreover, many of these devices are intermittently connected – particularly those roaming laptops – which makes validating and updating their configuration virtually impossible. Finally, most enterprises have many different types of servers, desktops, laptops and handheld devices, making cross-platform support a must for any security and systems management solution. Unlike alternative solutions, BigFix was purpose-built to work efficiently within these types of environments.  As you can see from the diagram, BigFix Agents can be deployed on all types of devices, whether those are running Windows, Windows Mobile, different flavors of UNIX, Linux and Mac.  The BigFix Agent is the “brains” of the BigFix Unified Management Platform and continuously assesses the state of the endpoint against policy, whether connected to the network or not.  As soon as it notices that an endpoint is out of compliance with a policy or checklist, it informs the BigFix server and executes the configured remediation strategy, and immediately notifies the BigFix Server of task status (completed, in process, not completed). The BigFix Server manages policy content – delivered in messages called “BigFix Fixlets” and updated continuously via the BigFix Content Delivery cloud-based service – and enables the BigFix Operator to maintain real-time visibility and control over all devices in the environment – including instantaneous discovery of devices that aren’t managed by BigFix.  Because most of the analysis, processing and enforcement work is done by the BigFix Agent rather than the Server, ONE BigFix Server can support more than 200K endpoints, enabling customers to make the most of their security and systems management investment.  Whatever specific BigFix solution a customer uses – whether it’s endpoint protection, systems lifecycle management or security configuration and vulnerability management – it’s delivered via a single management console view. Additionally, new services can be provisioned and delivered via the BigFix Content Delivery cloud with no additional hardware or software installations or network changes. Deployment is straightforward, and is typically completed within hours or days. Agents can automatically be installed within minutes, without disrupting end-users.   Additionally, most customers deploy BigFix Relays to help manage distributed devices and policy content and as you can see in the diagram – an existing workstation can be leveraged for this purpose.  Promoting an Agent to a Relay takes minutes and doesn’t require dedicated hardware or network configuration changes.   It’s entirely up to the customer how many Relays to deploy and where they’d like to place them; however, we can certainly make recommendations based on business and technical considerations.  In addition to caching patches and other software updates close to end user devices, BigFix Relays manage the bandwidth used by BigFix to ensure that systems and security management tasks don’t consume all available network bandwidth. To a world accustomed to multiple, fragmented technologies and point solutions, BigFix offers an alternative: the industry’s only single-console, single-agent platform that addresses operations, security and compliance initiatives in real-time and at global scale.