Wednesday, October 29, 2014

IBM Interconnect 2015: Only a Few Days Left to Save Money By Registering Early!

InterConnect-2015.jpg 
Three extraordinary IBM conferences--Pulse, Impact, and Innovate--have joined together to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 - 26 in Las Vegas, Nevada. Over 20,000 attendees will enjoy unprecedented networking opportunities, professional education, and technical certifications valued at more than $8,000.

From development to architecture to operations, InterConnect will provide the best in education, networking, and exhibits on topics like Cloud, Mobile, Security, DevOps, and more. Come see how the latest innovations in Asset Management, Smarter Process, IT Optimization, Decision Management, and Application Infrastructure can help you maximize the value of your technology investments.

* Register by October 31st to save $500 * 

To check out other IBM events and software offerings please visit my ibm.com page.

Tuesday, October 28, 2014

Live Webinar: Vertical Mobility Deployments - MaaS360 and Samsung Fitting Every Business Need

Join our upcoming live demo to learn about the tools available to help you manage window devices on your corporate network.

Mobility has reached a new phase, where enterprises at large are looking at mobile technologies to enable specific business process enhancements.  Join mobility experts from Samsung and MaaS360 to learn how they offer the best joint platform to customize a mobile business solution. You’ll also hear how the City of Philadelphia used MaaS360 with Samsung devices to enhance their field worker productivity.

In this session you will learn:
  • Samsung mobile device portfolio update
  • How MaaS360 and Samsung Knox offer best of breed security for any vertical solution
  • Use cases detailing ways to achieve secure mobility across various industries
Dates and times: 

Wednesday, October 22, 2014

Don’t Smoke? You Could Still Get Lung Cancer

An important article form the Cancer Care Team at the Cleveland Clinic.
Originally published on 10/21/14 by the Cleveland Clinic.
---
If you think you’re safe from lung cancer because you’ve never smoked, think again. Being a non-smoker doesn’t mean you cannot get lung cancer.

While cigarette smoking is the No. 1 cause of lung cancer, you also can get it from breathing secondhand smoke, being exposed to asbestos or radon, or having a family history of lung cancer.

Many people think  lung cancer always is the result of a personal choice to smoke cigarettes, and so don’t see lung cancer patients in the same light as, say, a breast cancer patient. However, the vast majority of people who die from lung cancer quit smoking long before they received a lung cancer diagnosis.

“There’s a huge stigma associated with lung cancer because the majority of people who die from it are either smokers or former smokers,” says oncologist Nathan Pennell, MD, PhD.

“But the fact is that anyone who has lungs can be exposed to toxins and develop lung cancer, so this is a disease that should concern everyone,” Dr. Pennell says.

One of the first questions people usually ask when they find out someone has lung cancer is, “Was he (or she) a smoker?”

“Tobacco smoke is one of the most addictive substances known to man, and addiction is a disease,” Dr. Pennell says. “Many people who smoke become addicted as teenagers. Whether you’re a smoker or not, nobody deserves to die from lung cancer.”

An under-funded area of research

More people in the United States die from lung cancer than any other type of cancer, according to the Centers for Disease Control and Prevention (CDC). This is true for men and women.

But because of the stigma associated with lung cancer, it is difficult for researchers to get funding to try to find a cure.

“Public funding has a lot to do with politics, and public opinion doesn’t support lung cancer as it does the so-called ‘blameless cancers’ like breast cancer or prostate cancer,” Dr. Pennell says. “Those types of cancers also have a lot more survivors who can advocate for funding.”

There are not enough lung cancer survivors to demand change, Dr. Pennell says. “Those who do survive often blame themselves, so there is a smaller percentage of survivors who are willing to tell their stories,” he says.

New breakthroughs in lung cancer treatments

Despite funding difficulties, medicine has made progress in lung cancer diagnosis and treatments over the last several years. Genetic testing is one example.

“There are many different types of lung cancer. Genetic testing has helped researchers to develop therapies that target specific types of cancer cells,”  Dr. Pennell says.

Immune-based therapies, in which the immune system is primed  to attack tumors,  also are showing potential for treating lung cancer, Dr. Pennell says. These therapies already have been approved for treating skin cancer.

Development of screening tools such as CT scans help with early identification of lung cancer, too, which Dr. Pennell says “could save tens of thousands of lives.”

“Unfortunately, we’re not getting much support from insurers to pay for them,” he says.

What you can do to help

"Lung cancer research needs financial support," Dr. Pennell says. "Advocating for support for lung cancer research could be the key to funding the research that discovers a cure."

“I would encourage survivors, especially those who never smoked, to advocate for lung cancer research and to let people know that progress is being made,” Dr. Pennell says. “We need to get the word out about how important this is to everyone, not just to those who smoke.”

---

Hutchinson Regional Medical Center data backup success reaches 98.7% with IBM.


Utilizing IBM Tivoli Storage Manager on a private, hybrid cloud for data backup, protection and recovery the Hutchinson Regional Medical Center saves 12 hours per week in data backup time, while achieving 98.7% backup success and robust data restore and recovery capabilities. 

Tuesday, October 21, 2014

Webinar: Secure Mobile Applications for the Enterprise

Thursday, October 23, 2014 at 2 p.m. Eastern / 11 a.m. Pacific

Click here to register.

As mobile becomes a primary computing platform for the enterprise, every business function will mobilize core operations through apps. Enterprise IT must protect the corporate data in the apps while preserving the end user experience.

MaaS360 Application Security helps mobile application developers embed enterprise-grade security in their applications. IT administrators can then containerize these apps and control the corporate data in the apps via policies.

Join Anar Taori as she discusses:
  • Managing the full app lifecycle
  • Deploying mobile apps in your organization
  • Real life use case: MaaS360 Worklight Integration

While the webinar will be recorded, we recommend you join the live event to take advantage of the live Q&A at the end of the presentation.

Friday, October 10, 2014

IBM Named Leader in The Forrester Wave: EMM, Q3 2014

News from the MaaSters Center:

After comparing MaaS360 to 14 other providers in EMM, we're excited to announce that we've been positioned as a Leader in The Forrester Wave: Enterprise Mobile Management, Q3 2014 report!
Forrester Research analysts found that “leaders balance OS, app and data management functionality while providing flexible container options and productivity apps, and have demonstrated a strong vision and road map to help customers bring their PC and mobile management strategies together.”


The Forrester Wave

The Forrester Wave: Enterprise Mobile Management is a premier, in-depth research report into the enterprise mobile management market that features a 27 criteria evaluation aimed at helping IT pros see where solutions stand against each other and aiding them in selecting the right partner for their EMM needs.

  • IBM received max scores in 10 out of 27 possible categories and earned the highest total score in "Current Offering”, which evaluated product features and functionality in categories such as:
  • Architecture and Scale – MaaS360 was simply built for SaaS (if the name wasn’t a give-away). Our cloud-first approach to development has allowed SMBs and Enterprises to quickly deploy devices in a FISMA certified cloud without interruptions or downtime. Over-the-air delivery of enrollment and other features means scale is only limited by your needs for mobile security and productivity.
  • Mobile Platform Support – We make it easier to support any of the mobile devices running within your organization thanks to our multi-platform support, giving you the peace of mind that the users and their devices accessing your sensitive enterprise data are secure and productive no matter what OS they run.
  • Reporting & Analytics – Full visibility through our single MaaS360 portal provides organizations with a real-time look into their device environment, full of detailed information about the corporate and personal devices within your organization allowing you take action with the click of a button.
  • Containerization – The MaaS360 Secure Productivity Suite enables organizations to take a dual persona approach to simply and securely separate corporate resources from a user’s personal data on any mobile device, ensuring a secure and productive user experience.
  • Data Management & Security – Our Enterprise Mobility Management solution allows organizations to simply manage and secure all data, documents and devices, while providing instant visibility into who's accessing the data, through one easy to use interface.
  • App Security – Through an application container, MaaS360 Mobile App Management capabilities provide organizations with the ability to secure and manage the enterprise and third-party applications in use within their mobile environment to ensure their data is secure.

Riding the EMM Wave

Having the right EMM solution in place will help your organization securely manage and provide devices, data, apps and content in your enterprise to empower a more productive and efficient workforce – no matter where they are.

For those of you who are looking to securely ride the EMM wave and make your business truly MobileFirst, take the opportunity to evaluate MaaS360 yourself with our Free 30-Day Trial! We’re sure you’ll see why we’re known as a leader in enterprise mobility solutions.

You can download your copy of The Forrester Wave: Enterprise Mobile Management, Q3 2014 report HERE!

Thursday, October 9, 2014

Automating the Datacenter with IBM Endpoint Manager

This post was originally published on October 2nd, 2014 by Brad Fisher on IBM developerWorks. It is the first in a series about leveraging IBM Endpoint Manager to automate the management of your datacenter.  Future blog posts will cover topics such as automated cluster patching, automating virtual and physical server builds, automating multi-tier application deployment and automating complex cross-server patching scenarios. Brad Fisher is a Senior Technical Staff Member in the Cloud and Smarter Infrastructure division of IBM.  Brad has over 25 years in the IT industry.  Having held positions in Cloud, Process Automation and Systems Management, most recently Brad has been working in Endpoint Management, focusing on IEM for Datacenters and the IEM for Server Automation solution, and how the Endpoint Management solutions can successfully manage a customers datacenter.

Managing even a simple datacenter entails some pretty complex activities… things like performing server builds, ensuring security compliance on servers, managing both a physical and virtual server environment as well as keeping servers patched.  Just patching is a complex activity as you have to deal with everything from patching single servers to patching business services that span multiple servers as well as patching nodes in a cluster… all while ensuring your servers are in a maintenance window and in some cases ensuring that you can patch business services and clusters while the service still remains available to process workloads.

IBM Endpoint Manager provides a solution called IBM Endpoint Manager for Datacenters that solves these problems in an elegant, automated manner, freeing up time for IT personnel to focus on other datacenter activities.

IBM Endpoint Manager for Datacenters value proposition is threefold:
  • Increase Effectiveness and Efficiency through higher levels of Automation
  • Improve Security posture through continuous configuration compliance
  • Facilitate Consolidation of Tools and Teams and manage all platforms with one Interface, so that your valuable resources can work on higher business value tasks
IBM Endpoint Manager for Datacenters helps improve datacenter performance and security by:
  • simplifying Server build and ongoing configuration management by more than 40%
  • reducing costs for cluster patching by more than 50%
  • increasing patch compliance to 98-99% first-pass success in minutes vs. days or weeks
  • continuous Security compliance and policy enforcement with 8,000+ out-of-the-box compliance checks
  • increasing IT Efficiency by leveraging automation from our integrated toolsets
With IBM Endpoint Manager for Datacenters you can sequence automation tasks in the correct order they need to be processed, even in parallel as needed, targeting individual tasks against different servers/groups of servers as necessary.

For a larger view, click the image above.
While there’s tens of thousands of out-of-the-box automation tasks provided by IBM, as well as an active online community that shares automation content they have built, if there’s ever automation content you need that isn’t provided it’s very easy using the included tooling to build your own automation content.

IBM Endpoint Manager for Datacenters can automate complex tasks in managing your datacenter and significantly reduce labor costs and increase efficiency of IT staff.

For more information see IBM Endpoint Manager for Datacenters

For videos on IBM Endpoint Manager for Datacenters, see IBM Endpoint Manager for Datacenters videos.

Monday, October 6, 2014

Shellshock Remediation 101: Secure Your Endpoints Today!

Live webinar at 10am Eastern on Wednesday, October 15th.

It’s been said that an ounce of prevention is worth a pound of cure. That’s great advice — unless you’re the one who needs the cure! 

Such is the case for those who've been infected with the Bash Bug. It doesn't take more than a quick web search to understand the severity of the bug. There is a lot of focus on prevention - which is great advice and something definitely worth listening to. But there’s not a lot of information about the cure - until now. 

Join our Unified Endpoint Management experts as they walk you through the steps you can take to remediate the Bash Bug today! You’ll learn how IBM Endpoint Manager can help you: 
  • Detect endpoints vulnerable to the Bash Bug within minutes (whether it’s on or off the network)
  • Patch vulnerable endpoints within minutes / hours with a 98% first-pass patch success rate
  • Protect by ensuring continuous security configuration compliance across all endpoints through a single console
The saying is true: An ounce of protection is certainly worth a pound of cure. With IBM Endpoint Manager, you get both. 

Friday, October 3, 2014

IBM Endpoint Manager Patch Management for Windows Extends Support to Include Non-Security "Update"

This post was originally published by cglimson and the IBM Endpoint Manager Application Engineering Team on September 30th, 2014 at the IBM DeveloperWorks' Endpoint Management Bog.

IBM Endpoint Manager is pleased to announce that Patch Management for Windows now extends support to include the "Update" type of non-security updates. "Update" refers to widely released fixes to address bugs that are non-critical or non-security related.

For a list of operating systems and applications, see the Supported OS wiki.

Action to take:
  • Gather the latest version of the the Patch Management for Windows (English) site.
Published site version:
  • Patching Management for Windows site, version 2090.
Additional links:
  • For a list of supported operating systems and applications, click HERE.

Wednesday, October 1, 2014

Deadline Extended! Call for Speakers for Interconnect 2015. (Topic = MaaS360)

Call for Speakers! Limited Spots Available!
Last date to submit proposals has been extended to October 10th!

Three extraordinary IBM conferences—Pulse, Impact, and Innovate—are joining forces to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 – 26 in Las Vegas, Nevada. Are you a MaaS360 user?  We are looking for speakers to tell their MaaS360 success stories - to share their expertise on using IBM MaaS360 to transform your business.

We’re focusing on five major areas this year, and would like IBM MaaS360 inside your organization. Specifically, we’d like to know how you’ve been able to:
  • Cut costs and downtime of managing and securing mobile devices.
  • Enable BYOD: Securely manage the mobile enterprise
  • Establish and measure the ROI associated with your Enterprise Mobility Management solution
  • Deploy and manage business apps for increased productivity
  • Securely access and share content for mobile collaboration

What's In It for You
  • IBM InterConnect is among the biggest events of its kind — we’re expecting over 20,000 attendees—and have the opportunity to attend sessions, get professional education and technical certifications valued at over US $8,000.*
  • Unparalleled opportunities to network with literally thousands of industry experts, thought leaders, and colleagues in a venue focused on the kind of innovations that matter to you. 
  • Showcase your own skills and expertise and establish yourself as a thought leader in front of industry experts and cohorts from around the globe. Elevate your career by sharing how you’re using IBM Endpoint Manager to transform your business.

Follow this link to submit a proposal to speak at InterConnect today (MaaS360 is covered under the Mobile Enterprise - Protect & Manage Mobile Infrastructure program). Session proposals will be accepted from now until October 10th. All accepted speakers may be eligible for free conference passes. Only a limited number of spots are available.

Paper requirements:  Your proposal must include a presentation title and a well-written abstract of approximately 100 words that reflects an organized description of what the presentation will cover.

Timeline for submissions 
  • Call for Speakers closes: 10 October 2014
  • Speakers will be notified: 20 October 2014
  • Presentation drafts due: 14 January 2015


Please don't hesitate to contact me if you have any questions. 
I look forward to seeing you at InterConnect 2015

Friday, September 26, 2014

Shell-shocked after Heartbleed? All you need to know about Bash bug & how to protect your data w/ IBM Endpoint Manager

Originally published at ServiceManagement360.com by Rohan Ramesh on September 26, 2014 
---
Just when you thought the worst was over for the year packed with security incidents from POS attacks to the Heartbleed bug, now we hear about the “Bash bug” that threatens to compromise everything from web servers to connected cameras and IOT devices.

What is the Bash bug?

This vulnerability was discovered by Stephane Chazelas and announced on the OSS-SEC mailing list (in addition to other security forums). This bug, which has been unnoticed for over two decades, allows attackers to execute malicious code within a bash shell (this is typically the command prompt on PCs, Macs and Linux machines), allowing them to overwrite authentication information and gain access to confidential information by taking control of the operating system.

If you thought the Heartbleed bug was bad, this is worse. It has been given a severity rating of 10 / 10 by the national vulnerability database and is predicted to leave a far larger number of endpoints unpatched due to the inability to identify all possible vulnerable devices in your organization.

What devices are affected?

The Bash bug affects Linux and Unix machines as well as hardware running Mac OSX, with the most vulnerable being web Apache –HTTP Server, and scripts executed by DHCP clients. This also affects a number of connected “Internet of Things” devices that have software built using Bash scripts. This could be anything from your cctv cameras to an Internet-connected light bulb in your home. Given that this bug has been around for a while, there may be older versions of OS on systems & devices that are vulnerable as well.

How do you protect your endpoints and data?

Within a day of the bug being disclosed, attackers are already looking for ways to target your systems – proof of concept code that exploits Bash using CGI scripts are already floating around the web.

There are two parts to fixing the problem. First, you need to identify every system within your organization on and off your network that is affected by this bug. Given the global reach of companies today, finding out these systems take time and even then, not all systems are identified. Second, you need remediation by applying a patch to all these systems, and many of them could be running different versions of operating systems. That means you need to apply a different patch for each type of OS. This adds to the complexity of getting all your systems patched in time.

What can IBM Endpoint customers do
to patch this vulnerability?

With IBM Endpoint Manager Client, which supports more than 90+ different flavors of operating systems, you can quickly enable “detection tasks and analyze content” through our patch support site, which will identify any systems that are vulnerable.

Task 1828: Check for “Shell Shock” bash Vulnerability (CVE-2014-7169)

Analysis 1829: “Shell Shock” bash Vulnerability (CVE-2014-7169) Status

Our security experts are working around the clock to update IBM Endpoint Manager to release patches that have been issued by operating system vendors. These can be applied to all your systems through the single centralized Endpoint Manager console. For instructions on how you can identify affected endpoints in your organization and a full list of operating system patches that have been released, click here.

If you currently do not have IBM Endpoint Manager, visit my website and contact me today to get our unique Unified Endpoint Management solution, which can find and fix problems across all your devices –from servers to smartphones – on and off the corporate network within minutes. Contact us on twitter @IBMEndpoint with any questions or concerns.

“This is high-quality, useful information and support. You and the IBM Endpoint Manager (BigFix) team continue to make us look good. Keep it up.”– Current IBM Endpoint Manager Customer