IBM Endpoint Manager. Maja Kehić. security

Similar documents
IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Administering System Center 2012 Configuration Manager

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Securing the Modern Data Center with Trend Micro Deep Security

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

IBM IBM Tivoli Endpoint Manager V8.1 Implementation.

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Changing face of endpoint security

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

10747D: Administering System Center 2012 Configuration Manager

Administering System Center Configuration Manager

IBM BigFix Compliance

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Sadržaj. Verzija 03/2017 Primjenjuje se od 20. novembra godine

"Charting the Course to Your Success!" MOC D Administering System Center 2012 Configuration Manager. Course Summary

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Administrering System Center 2012 Configuration Manager vd

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Symantec Endpoint Protection Family Feature Comparison

QRadar & StealthINTERCEPT

Administering System Center Configuration Manager

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Administering System Center Configuration Manager

System Center Course Administering System Center Configuration Manager. Length. Audience. 5 days

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

Maximum Security with Minimum Impact : Going Beyond Next Gen

NE Administering System Center Configuration Manager and Intune

Case Study Hrvatska pošta: Korisničko iskustvo iz snova. Tomislav Turk Samostalni sistem inženjer, Combis d.o.o. Zagreb,

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

A: Administering System Center Configuration Manager

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Datacenter Security: Protection Beyond OS LifeCycle

Microsoftova productivity vizija

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Cjenovnik usluga informacionog društva

Administering System Center 2012 Configuration Manager

AT&T Endpoint Security

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Course A: Administering System Center Configuration Manager

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Trend Micro and IBM Security QRadar SIEM

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Administering System Center 2012 Configuration Manager (10747D)

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

QuickSpecs. Aruba ClearPass OnGuard Software. Overview. Product overview. Key Features

Microsoft Administering System Center Configuration Manager

Automated Security for the Real-time Enterprise with VMware NSX and Trend Micro Deep Security Chris Van Den Abbeele, Global Solution Architect, Trend

A: Administering System Center Configuration Manager

SentinelOne Technical Brief

Administering System Center Configuration Manager

SaaS Flyer for Trend Micro

HPE Intelligent Management Center

ConnectWise Automate. What is ConnectWise Automate?

Administering System Center Configuration Manager and Intune

Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com

Administer System Center Configuration Manager for Desktop Support

MOC ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

About NitroSecurity. Application Data Monitor. Log Mgmt Database Monitor SIEM IDS / IPS. NitroEDB

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

IBM United States Software Announcement , dated November 15, 2011

Transforming Security Part 2: From the Device to the Data Center

Administering System Center Configuration Manager ( )

Kaspersky Security for Small and Medium Business

Stopping Advanced Persistent Threats In Cloud and DataCenters

Symantec Endpoint Protection

Copyright 2011 Trend Micro Inc.

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

ForeScout Extended Module for IBM BigFix

M20696 Administering System Center Configuration Manager and Intune

How to Secure Your Cloud with...a Cloud?

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Why the cloud matters?

Security in a Virtualized Environment with TrendMicro

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc.

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Administering System Center Configuration Manager ( A)

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

ForeScout Extended Module for IBM BigFix

First Look Showcase. Expanding our prevention, detection and response solutions. Sumedh Thakar Chief Product Officer, Qualys, Inc.

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

Securing the SMB Cloud Generation

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Administering System Center Configuration Manager

Everything visible. Everything secure.

1 Introduction Requirements Architecture Feature List... 3

Don t Be the Next Data Loss Story

Apache Solr kako i zašto ga koristiti. Josip Maslać, Nabava.net (Aplos d.o.o.)

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

ForeScout Extended Module for Carbon Black

Security Challenges: Integrating Apple Computers into Windows Environments

Proactive Approach to Cyber Security

How to manage evolving threats on evolving ICT assets across Enterprise

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Commercial Product Matrix

Transcription:

IBM Endpoint Manager Maja Kehić security

IBM Endpoint Manager Endpoints Jedinstven agent Desktop / laptop / server endpoint Mobile Purpose specific Jedinstvena konzola Zajednička infrastruktura Jedan server Patch Management Lifecycle Management Software Use Analysis Mobile Devices Power Management Server Automation Data Centers Security and Compliance Core Protection Systems Management Security Management IBM Endpoint Manager 8.6.2015 security 2

Princip rada Lightweight infrastruktura Ugrađena redundancija Podrška/sigurnost za uređaje u romingu Cloud-bazirana isporuka sadržaja Jedan server i konzola Izuzetno siguran i skalabilan Prikuplja podatke, analizira i izvještava Nameće predefinisane politike Jedinstven inteligentni agent Kontinuirana samoprocjena i ojačavanje politika Minimalan utjecaj na sistem (< 2% CPU) 8.6.2015 security 3

Patch & Lifecycle Management Patch Management Lifecycle Management Patch mogućnosti za višestruke platforme: Windows, Mac OS X, Linux and UNIX OS Patching Application Patching Skraćivanje vremena za patch i update Izvještavanje i automatizacija Asset Discovery, Patch Management, Inventory Management, Software Distribution, OS Deploymentt Skalabilnost, Detekcija i rezolucija oštećenih patch-eva, Unix, Linux, Windows, Mac OS X 8.6.2015 security 4

Patch Management 8.6.2015 security 5

Power Management & Security and Comliance Management Power Management Security & Comliance Management Cost reduction reports End-user Dashborad Izvještavanje Smanjenje troškova kroz uštede energije Asset Discovery and Visibility Patch Management Security Configuration Management Vulnerability Management Network Self Quarantine Anti-Malware & Web Reputation 8.6.2015 security 6

Mobile Device Management & Software Use Analysis Mobile Device Management Software Use Analysis MaaS360 Mobile Device Management Application Management App, PIM Containers Compliance Software Asset Discovery Software Use Metering Software Use Reporting Software Catalogue Correlation 8.6.2015 security 7

Software Use Analysis 8.6.2015 security 8

Server Automation & Data Centers Server Automation Data Centers Napredne opcije automatizacije akcija za servere Minimizacija programiranja Skalabilnost Identifikacija i rješavanje problema u kratkom roku Minimizacija ulaganja u infrastrukturu Skalabilnost 8.6.2015 security 9

Core Protection & Data Loss Prevention (Addon) Core Protection Data Loss Prevention (Add-on) Anti-Malware Windows i Mac Trend Micro Enterprise Client Firewall Skeniranje sadržaja osjetljivih podataka Zaštita strukturiranih podataka Definisanje politike upotrebe USB uređaja Kontrola aplikacija Kontrola ponašanja uređaja 8.6.2015 security 10

Dodatna zaštita dokumenata Obrazac (kreditna kartica, broj osiguranja, broj računa) Ključne riječi lista termina (povjerljivo, interno, projekt, naziv proizvoda) Atributi fajla naziv, veličina, tip 8.6.2015 security 11

Zaštita internih podataka Zaštita internih podataka 8.6.2015 security 8.6.2015 12

Slanje fajla preko webmaila 8.6.2015 security 13

Restrikcije pristupa uređaju X Restrikcije porta X Ključna riječ X Veličina dokumenta X Serijski broj X Ključna riječ X Veličina dokumenta X Restrikcija pristupa X Ključna riječ X Obrazac X Restrikcija porta 8.6.2015 security 14

Zašto IBM Endpoint Manager? 15 1) Upravljanje uređajima bez obzira na operativni sistem koji koriste 2) Integrisano rješenje za endpoint uređaje 3) Analize, izvještavanje i usklađenost u realnom vremenu 4) Jednostavno rješenje za upotrebu 5) Potpuna kontrola i prilagodljivost potrebama klijenta 8.6.2015 security 8.6.2015 15

ALEM Sistem d.o.o. Sarajevo Stolačka 20 71000 Sarajevo Bosna i Hercegovina tel: +387 33 208 735 fax: +387 33 208 744 mail: info@alemsistem.ba www.alemsistem.ba 8.6.2015 security 16