Friday, October 10, 2014

IBM Named Leader in The Forrester Wave: EMM, Q3 2014

News from the MaaSters Center:

After comparing MaaS360 to 14 other providers in EMM, we're excited to announce that we've been positioned as a Leader in The Forrester Wave: Enterprise Mobile Management, Q3 2014 report!
Forrester Research analysts found that “leaders balance OS, app and data management functionality while providing flexible container options and productivity apps, and have demonstrated a strong vision and road map to help customers bring their PC and mobile management strategies together.”

The Forrester Wave

The Forrester Wave: Enterprise Mobile Management is a premier, in-depth research report into the enterprise mobile management market that features a 27 criteria evaluation aimed at helping IT pros see where solutions stand against each other and aiding them in selecting the right partner for their EMM needs.

  • IBM received max scores in 10 out of 27 possible categories and earned the highest total score in "Current Offering”, which evaluated product features and functionality in categories such as:
  • Architecture and Scale – MaaS360 was simply built for SaaS (if the name wasn’t a give-away). Our cloud-first approach to development has allowed SMBs and Enterprises to quickly deploy devices in a FISMA certified cloud without interruptions or downtime. Over-the-air delivery of enrollment and other features means scale is only limited by your needs for mobile security and productivity.
  • Mobile Platform Support – We make it easier to support any of the mobile devices running within your organization thanks to our multi-platform support, giving you the peace of mind that the users and their devices accessing your sensitive enterprise data are secure and productive no matter what OS they run.
  • Reporting & Analytics – Full visibility through our single MaaS360 portal provides organizations with a real-time look into their device environment, full of detailed information about the corporate and personal devices within your organization allowing you take action with the click of a button.
  • Containerization – The MaaS360 Secure Productivity Suite enables organizations to take a dual persona approach to simply and securely separate corporate resources from a user’s personal data on any mobile device, ensuring a secure and productive user experience.
  • Data Management & Security – Our Enterprise Mobility Management solution allows organizations to simply manage and secure all data, documents and devices, while providing instant visibility into who's accessing the data, through one easy to use interface.
  • App Security – Through an application container, MaaS360 Mobile App Management capabilities provide organizations with the ability to secure and manage the enterprise and third-party applications in use within their mobile environment to ensure their data is secure.

Riding the EMM Wave

Having the right EMM solution in place will help your organization securely manage and provide devices, data, apps and content in your enterprise to empower a more productive and efficient workforce – no matter where they are.

For those of you who are looking to securely ride the EMM wave and make your business truly MobileFirst, take the opportunity to evaluate MaaS360 yourself with our Free 30-Day Trial! We’re sure you’ll see why we’re known as a leader in enterprise mobility solutions.

You can download your copy of The Forrester Wave: Enterprise Mobile Management, Q3 2014 report HERE!

Thursday, October 9, 2014

Automating the Datacenter with IBM Endpoint Manager

This post was originally published on October 2nd, 2014 by Brad Fisher on IBM developerWorks. It is the first in a series about leveraging IBM Endpoint Manager to automate the management of your datacenter.  Future blog posts will cover topics such as automated cluster patching, automating virtual and physical server builds, automating multi-tier application deployment and automating complex cross-server patching scenarios. Brad Fisher is a Senior Technical Staff Member in the Cloud and Smarter Infrastructure division of IBM.  Brad has over 25 years in the IT industry.  Having held positions in Cloud, Process Automation and Systems Management, most recently Brad has been working in Endpoint Management, focusing on IEM for Datacenters and the IEM for Server Automation solution, and how the Endpoint Management solutions can successfully manage a customers datacenter.

Managing even a simple datacenter entails some pretty complex activities… things like performing server builds, ensuring security compliance on servers, managing both a physical and virtual server environment as well as keeping servers patched.  Just patching is a complex activity as you have to deal with everything from patching single servers to patching business services that span multiple servers as well as patching nodes in a cluster… all while ensuring your servers are in a maintenance window and in some cases ensuring that you can patch business services and clusters while the service still remains available to process workloads.

IBM Endpoint Manager provides a solution called IBM Endpoint Manager for Datacenters that solves these problems in an elegant, automated manner, freeing up time for IT personnel to focus on other datacenter activities.

IBM Endpoint Manager for Datacenters value proposition is threefold:
  • Increase Effectiveness and Efficiency through higher levels of Automation
  • Improve Security posture through continuous configuration compliance
  • Facilitate Consolidation of Tools and Teams and manage all platforms with one Interface, so that your valuable resources can work on higher business value tasks
IBM Endpoint Manager for Datacenters helps improve datacenter performance and security by:
  • simplifying Server build and ongoing configuration management by more than 40%
  • reducing costs for cluster patching by more than 50%
  • increasing patch compliance to 98-99% first-pass success in minutes vs. days or weeks
  • continuous Security compliance and policy enforcement with 8,000+ out-of-the-box compliance checks
  • increasing IT Efficiency by leveraging automation from our integrated toolsets
With IBM Endpoint Manager for Datacenters you can sequence automation tasks in the correct order they need to be processed, even in parallel as needed, targeting individual tasks against different servers/groups of servers as necessary.

For a larger view, click the image above.
While there’s tens of thousands of out-of-the-box automation tasks provided by IBM, as well as an active online community that shares automation content they have built, if there’s ever automation content you need that isn’t provided it’s very easy using the included tooling to build your own automation content.

IBM Endpoint Manager for Datacenters can automate complex tasks in managing your datacenter and significantly reduce labor costs and increase efficiency of IT staff.

For more information see IBM Endpoint Manager for Datacenters

For videos on IBM Endpoint Manager for Datacenters, see IBM Endpoint Manager for Datacenters videos.

Monday, October 6, 2014

Shellshock Remediation 101: Secure Your Endpoints Today!

Live webinar at 10am Eastern on Wednesday, October 15th.

It’s been said that an ounce of prevention is worth a pound of cure. That’s great advice — unless you’re the one who needs the cure! 

Such is the case for those who've been infected with the Bash Bug. It doesn't take more than a quick web search to understand the severity of the bug. There is a lot of focus on prevention - which is great advice and something definitely worth listening to. But there’s not a lot of information about the cure - until now. 

Join our Unified Endpoint Management experts as they walk you through the steps you can take to remediate the Bash Bug today! You’ll learn how IBM Endpoint Manager can help you: 
  • Detect endpoints vulnerable to the Bash Bug within minutes (whether it’s on or off the network)
  • Patch vulnerable endpoints within minutes / hours with a 98% first-pass patch success rate
  • Protect by ensuring continuous security configuration compliance across all endpoints through a single console
The saying is true: An ounce of protection is certainly worth a pound of cure. With IBM Endpoint Manager, you get both. 

Friday, October 3, 2014

IBM Endpoint Manager Patch Management for Windows Extends Support to Include Non-Security "Update"

This post was originally published by cglimson and the IBM Endpoint Manager Application Engineering Team on September 30th, 2014 at the IBM DeveloperWorks' Endpoint Management Bog.

IBM Endpoint Manager is pleased to announce that Patch Management for Windows now extends support to include the "Update" type of non-security updates. "Update" refers to widely released fixes to address bugs that are non-critical or non-security related.

For a list of operating systems and applications, see the Supported OS wiki.

Action to take:
  • Gather the latest version of the the Patch Management for Windows (English) site.
Published site version:
  • Patching Management for Windows site, version 2090.
Additional links:
  • For a list of supported operating systems and applications, click HERE.

Wednesday, October 1, 2014

Deadline Extended! Call for Speakers for Interconnect 2015. (Topic = MaaS360)

Call for Speakers! Limited Spots Available!
Last date to submit proposals has been extended to October 10th!

Three extraordinary IBM conferences—Pulse, Impact, and Innovate—are joining forces to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 – 26 in Las Vegas, Nevada. Are you a MaaS360 user?  We are looking for speakers to tell their MaaS360 success stories - to share their expertise on using IBM MaaS360 to transform your business.

We’re focusing on five major areas this year, and would like IBM MaaS360 inside your organization. Specifically, we’d like to know how you’ve been able to:
  • Cut costs and downtime of managing and securing mobile devices.
  • Enable BYOD: Securely manage the mobile enterprise
  • Establish and measure the ROI associated with your Enterprise Mobility Management solution
  • Deploy and manage business apps for increased productivity
  • Securely access and share content for mobile collaboration

What's In It for You
  • IBM InterConnect is among the biggest events of its kind — we’re expecting over 20,000 attendees—and have the opportunity to attend sessions, get professional education and technical certifications valued at over US $8,000.*
  • Unparalleled opportunities to network with literally thousands of industry experts, thought leaders, and colleagues in a venue focused on the kind of innovations that matter to you. 
  • Showcase your own skills and expertise and establish yourself as a thought leader in front of industry experts and cohorts from around the globe. Elevate your career by sharing how you’re using IBM Endpoint Manager to transform your business.

Follow this link to submit a proposal to speak at InterConnect today (MaaS360 is covered under the Mobile Enterprise - Protect & Manage Mobile Infrastructure program). Session proposals will be accepted from now until October 10th. All accepted speakers may be eligible for free conference passes. Only a limited number of spots are available.

Paper requirements:  Your proposal must include a presentation title and a well-written abstract of approximately 100 words that reflects an organized description of what the presentation will cover.

Timeline for submissions 
  • Call for Speakers closes: 10 October 2014
  • Speakers will be notified: 20 October 2014
  • Presentation drafts due: 14 January 2015

Please don't hesitate to contact me if you have any questions. 
I look forward to seeing you at InterConnect 2015

Friday, September 26, 2014

Shell-shocked after Heartbleed? All you need to know about Bash bug & how to protect your data w/ IBM Endpoint Manager

Originally published at by Rohan Ramesh on September 26, 2014 
Just when you thought the worst was over for the year packed with security incidents from POS attacks to the Heartbleed bug, now we hear about the “Bash bug” that threatens to compromise everything from web servers to connected cameras and IOT devices.

What is the Bash bug?

This vulnerability was discovered by Stephane Chazelas and announced on the OSS-SEC mailing list (in addition to other security forums). This bug, which has been unnoticed for over two decades, allows attackers to execute malicious code within a bash shell (this is typically the command prompt on PCs, Macs and Linux machines), allowing them to overwrite authentication information and gain access to confidential information by taking control of the operating system.

If you thought the Heartbleed bug was bad, this is worse. It has been given a severity rating of 10 / 10 by the national vulnerability database and is predicted to leave a far larger number of endpoints unpatched due to the inability to identify all possible vulnerable devices in your organization.

What devices are affected?

The Bash bug affects Linux and Unix machines as well as hardware running Mac OSX, with the most vulnerable being web Apache –HTTP Server, and scripts executed by DHCP clients. This also affects a number of connected “Internet of Things” devices that have software built using Bash scripts. This could be anything from your cctv cameras to an Internet-connected light bulb in your home. Given that this bug has been around for a while, there may be older versions of OS on systems & devices that are vulnerable as well.

How do you protect your endpoints and data?

Within a day of the bug being disclosed, attackers are already looking for ways to target your systems – proof of concept code that exploits Bash using CGI scripts are already floating around the web.

There are two parts to fixing the problem. First, you need to identify every system within your organization on and off your network that is affected by this bug. Given the global reach of companies today, finding out these systems take time and even then, not all systems are identified. Second, you need remediation by applying a patch to all these systems, and many of them could be running different versions of operating systems. That means you need to apply a different patch for each type of OS. This adds to the complexity of getting all your systems patched in time.

What can IBM Endpoint customers do
to patch this vulnerability?

With IBM Endpoint Manager Client, which supports more than 90+ different flavors of operating systems, you can quickly enable “detection tasks and analyze content” through our patch support site, which will identify any systems that are vulnerable.

Task 1828: Check for “Shell Shock” bash Vulnerability (CVE-2014-7169)

Analysis 1829: “Shell Shock” bash Vulnerability (CVE-2014-7169) Status

Our security experts are working around the clock to update IBM Endpoint Manager to release patches that have been issued by operating system vendors. These can be applied to all your systems through the single centralized Endpoint Manager console. For instructions on how you can identify affected endpoints in your organization and a full list of operating system patches that have been released, click here.

If you currently do not have IBM Endpoint Manager, visit my website and contact me today to get our unique Unified Endpoint Management solution, which can find and fix problems across all your devices –from servers to smartphones – on and off the corporate network within minutes. Contact us on twitter @IBMEndpoint with any questions or concerns.

“This is high-quality, useful information and support. You and the IBM Endpoint Manager (BigFix) team continue to make us look good. Keep it up.”– Current IBM Endpoint Manager Customer

Wednesday, September 24, 2014

Free Pizza and Webinar! Detect, Deploy, Protect: Endpoint Security Management for Datacenters

Join Champion Solutions Group and IBM to discuss the
explosion of security breaches in the datacenter and the need for visibility and simplification in managing datacenter security.

October 6th from 2pm to 3pm EDT

Register and enjoy a pizza - ON US - during the presentation!
RSVP your order along with your name, phone number,
and address to
and we will confirm your attendance!

Did you know?
  • DDos attacks in the datacenter are up 70% from last year.
  • A recent survey showed that 10% of respondents said they had experienced over 100 DDos attacks in 2013.
  • Most cyber security breaches go undetected for eight months.
Secure your data center!
See how you can reduce your exposure to
Heartbleed and other attacks!

Learn how to...
  • Automate cluster machine patching
  • Automate entire application patching
  • Control rapid virtual machine deployment


Tuesday, September 23, 2014

TED@IBM Live Chat

Monday, September 22, 2014

IBM InterConnect 2015: The Premier Cloud and Mobile Conference! Register early and save!

Three extraordinary IBM conferences--Pulse, Impact, and Innovate--have joined together to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 - 26 in Las Vegas, Nevada. Over 20,000 attendees will enjoy unprecedented networking opportunities, professional education, and technical certifications valued at more than $8,000.

From development to architecture to operations, InterConnect will provide the best in education, networking, and exhibits on topics like Cloud, Mobile, Security, DevOps, and more. Come see how the latest innovations in Asset Management, Smarter Process, IT Optimization, Decision Management, and Application Infrastructure can help you maximize the value of your technology investments.

* Register by Octoer 31st to save $500 * 

To check out other IBM events and software offerings please visit my page.

Friday, September 19, 2014

IBM Tivoli Storage Manager Hands-On Workshops

IBM Storage Management Labs
Wednesday, October 15th and/or Thursday, October 16th from 9am to 4pm in Dublin, Ohio
IBM is offering a local opportunity for interested parties in central Ohio to build technical skill using labs from the Pulse 2014 event.  Access to the labs is no cost to you.  These hands-on storage management labs are self-paced.  Perform one or more Pulse labs on either or both days.

Hands-on Labs:
  • Hands-on labs provide an excellent opportunity to gain first-hand technical experience with IBM's products and solutions.
  • Come to the lab room at your convenience and take as many of the labs as you like.
  • Lab exercises are self-paced and designed to take between 45 and 90 minutes each.
  • Don't miss this opportunity even if you have no gaps in your busy schedule.
  • Subject Matter Experts will be on-site to point you to the topics that best fit your interest and to assist you with your lab exercises.
  • Personalized Whiteboard Sessions are are available upon request.

Available labs in these technical areas:
  • IBM Tivoli Storage Manager - Enterprise backup, archive, recovery, space management, database and application protection, and bare machine recovery and disaster recovery capabilities.
  • IBM Tivoli Storage Manager for Virtual Environments - Provides advanced data protection and flexible recovery options for VMware vSphere ESX and ESXi servers.
  • IBM Tivoli Storage FlashCopy Manager - Perform and manage frequent, near-instant, non-destructive, application-aware backups and restore, leveraging advanced FlashCopy snapshot technologies in IBM and non-IBM storage systems.
Click here for the specific labs to choose from.
  • Provide the opportunity for hands-on access to some our most popular software solutions in a lab/training environment.
  • The is workshop is appropriate for TSM administrators, storage administrators, VMware administrators, and SQL database administrators.
  • These sessions are offered free of charge.  
  • Participants are responsible for their own business travel expenses. (*Meals are being provided for attendees who are permitted to accept vendor meals. For example, non-government employees and contractors.)
  • October 15th and/or October 16th, 9am - 4pm
  • To request enrollment in one of our scheduled meetings, send an e-mail with the requested lab:
    • Subject Line = "IBM Workshop Lab - Enrollment Request"
    • Please be sure to include the following in body of email:  Your name, e-mail address, phone number, company/organization name, and lab session requested.
  • Seating is limited.  Enrollments will be processed on a first-come, first-served basis.  A confirmation e-mail will be sent approximately one week prior to the workshop.

Thursday, September 18, 2014