Delivering confidence in achieving mobile security and productivity by mitigating operational risk
Today’s enterprise mobile security has moved far beyond simply protecting device-resident corporate email and data. The devices are ubiquitous, they have almost full access to the network, and it is becoming common that IT did not even provide the device. In such a “Wild West” environment, how can a company possibly be confident that their network, data and applications are secure? IBM believes that there are four main tenets to doing so: protecting the devices our employees use by thwarting malware, providing secure connectivity, ensuring appropriate and secure access to enterprise data and systems, and building safe applications within a reliable and secure app platform. IBM provides solutions and services for all four of these areas, with the ability to start anywhere depending on business priorities. In addition, IBM security products and services look not only at your mobile security needs, but holistically at your entire network. Our key security products include integrated, one-view dashboards and functionality to secure any type of endpoint or network, whether an smartphone, a PC, a server or a router. With such a holistic view available, true Mobile Security Intelligence is finally possible.
Mobile security intelligence provides a holistic view of events flowing across the various mobile security solutions employed by an enterprise. Mobile Security Intelligence goes beyond reporting - awareness coupled with advanced analytics empowers an organisation to make proactive decisions and deliver an adaptive security posture.
Learn more about each of the facets of mobile security:
A mobile application platform solution provides another layer of sandboxing and data security for enterprise mobile apps.
- Learn More
Mobile Application Platform and ContainersFrom a security perspective a mobile application platform solution provides another layer of sandboxing and data security for enterprise mobile apps. They can allow for securely storing data on the local device, providing offline access, centralizing enforcement of security policies and preventing data leakage. A mobile application platform has natural integration points with MDM solutions.
Mobile Device Management (MDM) solutions enable a mobile enterprise to centrally manage and secure mobile.
- Learn more
Mobile Device ManagementMobile Device Management (MDM) solutions enable a mobile enterprise to centrally manage and secure mobile devices that fall under its purview. MDM empowers an administrator to enforce corporate policies on those devices and restrict devices that are not compliant. MDM solutions are generally utilized in a business-to-employee scenario, allowing an enterprise to mitigate the risks associated with enterprise data and applications residing on mobile devices - i.e. lost or stolen devices. MDM offers the infrastructure to deliver other security capabilities to the devices (i.e. mobile threat protection).
Mobile Threat Management is used to describe a portfolio of technologies used to protect mobile devices and enterprise networks from Internet borne attacks.
- Learn more
Mobile Threat ManagementMobile Threat Management is used to describe a portfolio of technologies used to protect mobile devices and enterprise networks from Internet borne attacks. Typical client side solutions include anti-virus/anti-malware offerings. However, threat protection can also be delivered on servers to protect both clients and the network from malware.
Protecting Enterprise data is a central theme of mobile security.
- Learn more
Mobile Information ProtectionProtecting enterprise data is a central theme of mobile security. Whether the data is being accessed on back-end systems or in transit over the wire or stored locally on a mobile device, its security is of top priority to a business. Mobile Information Protection refers to a set of capabilities, which can potentially be delivered by different solutions. Each solution may offer different techniques to address a part of the mobile information protection requirement. For example, MDM solutions can help wipe data on devices if they are compromised and mobile Identity and Access Management (IAM) solutions can prevent access to data to unauthorized users.
Mobile devices connect from a variety of locations and therefore there is a need to keep communications private and secure.
- Learn more
Mobile Network ProtectionMobile network protection solutions focus on one of two main requirements. Mobile devices connect from a variety of locations and therefore there is a need to keep communications private and secure. Advanced solutions are adaptive in nature to address the unique nature of mobile devices - roaming, battery-life, among others. Given the vast number of mobile devices, another set of mobile network protection solutions aim to protect the corporate network from malicious or compromised mobile devices.
In a mobile environment the identity of the user as well as the device needs to be verified.
- Learn more
Mobile Identity & Access ManagementMobile Identity and Access Management (mIAM) solutions are employed to authenticate and authorize users and their devices. In a mobile environment the identity of the user as well as the device needs to be verified. Access to enterprise systems needs to be guarded to avoid unauthorized access to enterprise data or applications. As mobile devices are multi-purpose devices that are often shared, with most mobile apps connected to back-end systems to deliver content or functionality, a solid mIAM solution is a must-have for any Enterprise that is serious about their overall security posture.
Building safe mobile apps requires secure mobile application development solutions that facilitate the integration of best practices in the design, development, test and execution of mobile apps.
- Learn more
Secured Mobile ApplicationsThe practice of building safe mobile apps requires secure mobile application development solutions that facilitate the integration of best practices in the design, development, test and execution of mobile apps. Tools to, manage the app life-cycle, enforce corporate guidelines in the development process and perform vulnerability testing form the basis of a secure mobile application development solution. These solutions can be closely linked to the mobile application platform employed.
IBM provides solutions and services to help secure your entire mobile security environment, with the ability to start anywhere depending on business priorities. In addition, our key security products include integrated, one-view dashboards and functionality to secure any type of endpoint or network, whether a smartphone, a PC, a server or a router. With such a holistic view available, true Mobile Security Intelligence is finally possible.
IBM Endpoint Manager for Mobile Devices
Unify the security and management of traditional endpoints as well as Apple iOS, Google Android, Symbian, and Microsoft Windows Phone devices.
Mobile Enterprise Services (US)|
An integrated services solution of capabilities for smartphones and tablets to help you manage the proliferation of mobile devices in your workplace and the growing demand for secure access to corporate data.
IBM Security Access Manager
Simplify password management, strengthen access security and demonstrate compliance.
Enterprise Wireless Networks|
Security-rich and robust wireless network solutions that can deliver virtually anytime, anywhere communications.
WebSphere DataPower Service Gateway XG45 appliance (US)
Secures web services, applications and data with customizable, scalable and automated service visibility and governance.
Hosted Mobile Device Security Management|
Helps protect against malware and other threats, providing the knowledge, technology and ongoing management to make mobile device security virtually "turn key".
Application security testing and risk management solutions.
IBM Lotus Mobile Connect|
Security-rich connection from popular mobile devices to enterprise hosted solutions.