Wednesday, October 1, 2014

Deadline Extended! Call for Speakers for Interconnect 2015. (Topic = MaaS360)

Call for Speakers! Limited Spots Available!
Last date to submit proposals has been extended to October 10th!

Three extraordinary IBM conferences—Pulse, Impact, and Innovate—are joining forces to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 – 26 in Las Vegas, Nevada. Are you a MaaS360 user?  We are looking for speakers to tell their MaaS360 success stories - to share their expertise on using IBM MaaS360 to transform your business.

We’re focusing on five major areas this year, and would like IBM MaaS360 inside your organization. Specifically, we’d like to know how you’ve been able to:
  • Cut costs and downtime of managing and securing mobile devices.
  • Enable BYOD: Securely manage the mobile enterprise
  • Establish and measure the ROI associated with your Enterprise Mobility Management solution
  • Deploy and manage business apps for increased productivity
  • Securely access and share content for mobile collaboration

What's In It for You
  • IBM InterConnect is among the biggest events of its kind — we’re expecting over 20,000 attendees—and have the opportunity to attend sessions, get professional education and technical certifications valued at over US $8,000.*
  • Unparalleled opportunities to network with literally thousands of industry experts, thought leaders, and colleagues in a venue focused on the kind of innovations that matter to you. 
  • Showcase your own skills and expertise and establish yourself as a thought leader in front of industry experts and cohorts from around the globe. Elevate your career by sharing how you’re using IBM Endpoint Manager to transform your business.

Follow this link to submit a proposal to speak at InterConnect today (MaaS360 is covered under the Mobile Enterprise - Protect & Manage Mobile Infrastructure program). Session proposals will be accepted from now until October 10th. All accepted speakers may be eligible for free conference passes. Only a limited number of spots are available.

Paper requirements:  Your proposal must include a presentation title and a well-written abstract of approximately 100 words that reflects an organized description of what the presentation will cover.

Timeline for submissions 
  • Call for Speakers closes: 10 October 2014
  • Speakers will be notified: 20 October 2014
  • Presentation drafts due: 14 January 2015


Please don't hesitate to contact me if you have any questions. 
I look forward to seeing you at InterConnect 2015

Friday, September 26, 2014

Shell-shocked after Heartbleed? All you need to know about Bash bug & how to protect your data w/ IBM Endpoint Manager

Originally published at ServiceManagement360.com by Rohan Ramesh on September 26, 2014 
---
Just when you thought the worst was over for the year packed with security incidents from POS attacks to the Heartbleed bug, now we hear about the “Bash bug” that threatens to compromise everything from web servers to connected cameras and IOT devices.

What is the Bash bug?

This vulnerability was discovered by Stephane Chazelas and announced on the OSS-SEC mailing list (in addition to other security forums). This bug, which has been unnoticed for over two decades, allows attackers to execute malicious code within a bash shell (this is typically the command prompt on PCs, Macs and Linux machines), allowing them to overwrite authentication information and gain access to confidential information by taking control of the operating system.

If you thought the Heartbleed bug was bad, this is worse. It has been given a severity rating of 10 / 10 by the national vulnerability database and is predicted to leave a far larger number of endpoints unpatched due to the inability to identify all possible vulnerable devices in your organization.

What devices are affected?

The Bash bug affects Linux and Unix machines as well as hardware running Mac OSX, with the most vulnerable being web Apache –HTTP Server, and scripts executed by DHCP clients. This also affects a number of connected “Internet of Things” devices that have software built using Bash scripts. This could be anything from your cctv cameras to an Internet-connected light bulb in your home. Given that this bug has been around for a while, there may be older versions of OS on systems & devices that are vulnerable as well.

How do you protect your endpoints and data?

Within a day of the bug being disclosed, attackers are already looking for ways to target your systems – proof of concept code that exploits Bash using CGI scripts are already floating around the web.

There are two parts to fixing the problem. First, you need to identify every system within your organization on and off your network that is affected by this bug. Given the global reach of companies today, finding out these systems take time and even then, not all systems are identified. Second, you need remediation by applying a patch to all these systems, and many of them could be running different versions of operating systems. That means you need to apply a different patch for each type of OS. This adds to the complexity of getting all your systems patched in time.

What can IBM Endpoint customers do
to patch this vulnerability?

With IBM Endpoint Manager Client, which supports more than 90+ different flavors of operating systems, you can quickly enable “detection tasks and analyze content” through our patch support site, which will identify any systems that are vulnerable.

Task 1828: Check for “Shell Shock” bash Vulnerability (CVE-2014-7169)

Analysis 1829: “Shell Shock” bash Vulnerability (CVE-2014-7169) Status

Our security experts are working around the clock to update IBM Endpoint Manager to release patches that have been issued by operating system vendors. These can be applied to all your systems through the single centralized Endpoint Manager console. For instructions on how you can identify affected endpoints in your organization and a full list of operating system patches that have been released, click here.

If you currently do not have IBM Endpoint Manager, visit my website and contact me today to get our unique Unified Endpoint Management solution, which can find and fix problems across all your devices –from servers to smartphones – on and off the corporate network within minutes. Contact us on twitter @IBMEndpoint with any questions or concerns.

“This is high-quality, useful information and support. You and the IBM Endpoint Manager (BigFix) team continue to make us look good. Keep it up.”– Current IBM Endpoint Manager Customer

Wednesday, September 24, 2014

Free Pizza and Webinar! Detect, Deploy, Protect: Endpoint Security Management for Datacenters


Join Champion Solutions Group and IBM to discuss the
explosion of security breaches in the datacenter and the need for visibility and simplification in managing datacenter security.

October 6th from 2pm to 3pm EDT

Register and enjoy a pizza - ON US - during the presentation!
RSVP your order along with your name, phone number,
and address to dmlinar@championsg.com
and we will confirm your attendance!

Did you know?
  • DDos attacks in the datacenter are up 70% from last year.
  • A recent survey showed that 10% of respondents said they had experienced over 100 DDos attacks in 2013.
  • Most cyber security breaches go undetected for eight months.
Secure your data center!
See how you can reduce your exposure to
Heartbleed and other attacks!

Learn how to...
  • Automate cluster machine patching
  • Automate entire application patching
  • Control rapid virtual machine deployment

video


Tuesday, September 23, 2014

TED@IBM Live Chat

Monday, September 22, 2014

IBM InterConnect 2015: The Premier Cloud and Mobile Conference! Register early and save!

InterConnect-2015.jpg 
Three extraordinary IBM conferences--Pulse, Impact, and Innovate--have joined together to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 - 26 in Las Vegas, Nevada. Over 20,000 attendees will enjoy unprecedented networking opportunities, professional education, and technical certifications valued at more than $8,000.

From development to architecture to operations, InterConnect will provide the best in education, networking, and exhibits on topics like Cloud, Mobile, Security, DevOps, and more. Come see how the latest innovations in Asset Management, Smarter Process, IT Optimization, Decision Management, and Application Infrastructure can help you maximize the value of your technology investments.

* Register by Octoer 31st to save $500 * 

To check out other IBM events and software offerings please visit my ibm.com page.

Friday, September 19, 2014

IBM Tivoli Storage Manager Hands-On Workshops

IBM Storage Management Labs
Wednesday, October 15th and/or Thursday, October 16th from 9am to 4pm in Dublin, Ohio
IBM is offering a local opportunity for interested parties in central Ohio to build technical skill using labs from the Pulse 2014 event.  Access to the labs is no cost to you.  These hands-on storage management labs are self-paced.  Perform one or more Pulse labs on either or both days.

Hands-on Labs:
  • Hands-on labs provide an excellent opportunity to gain first-hand technical experience with IBM's products and solutions.
  • Come to the lab room at your convenience and take as many of the labs as you like.
  • Lab exercises are self-paced and designed to take between 45 and 90 minutes each.
  • Don't miss this opportunity even if you have no gaps in your busy schedule.
  • Subject Matter Experts will be on-site to point you to the topics that best fit your interest and to assist you with your lab exercises.
  • Personalized Whiteboard Sessions are are available upon request.

Available labs in these technical areas:
  • IBM Tivoli Storage Manager - Enterprise backup, archive, recovery, space management, database and application protection, and bare machine recovery and disaster recovery capabilities.
  • IBM Tivoli Storage Manager for Virtual Environments - Provides advanced data protection and flexible recovery options for VMware vSphere ESX and ESXi servers.
  • IBM Tivoli Storage FlashCopy Manager - Perform and manage frequent, near-instant, non-destructive, application-aware backups and restore, leveraging advanced FlashCopy snapshot technologies in IBM and non-IBM storage systems.
Click here for the specific labs to choose from.
Location:
Objective:
  • Provide the opportunity for hands-on access to some our most popular software solutions in a lab/training environment.
Audience:
  • The is workshop is appropriate for TSM administrators, storage administrators, VMware administrators, and SQL database administrators.
Cost:
  • These sessions are offered free of charge.  
  • Participants are responsible for their own business travel expenses. (*Meals are being provided for attendees who are permitted to accept vendor meals. For example, non-government employees and contractors.)
Schedule:
  • October 15th and/or October 16th, 9am - 4pm
Enrollment:
  • To request enrollment in one of our scheduled meetings, send an e-mail with the requested lab:
    • Subject Line = "IBM Workshop Lab - Enrollment Request"
    • Please be sure to include the following in body of email:  Your name, e-mail address, phone number, company/organization name, and lab session requested.
  • Seating is limited.  Enrollments will be processed on a first-come, first-served basis.  A confirmation e-mail will be sent approximately one week prior to the workshop.

Thursday, September 18, 2014

Wednesday, September 17, 2014

IBM Introduces Powerful Analytics for Everyone

ARMONK, N.Y. - 16 Sep 2014: Making its biggest announcement in a decade as leader in analytics, IBM (NYSE: IBM) today announced Watson Analytics, a breakthrough natural language-based cognitive service that can provide instant access to powerful predictive and visual analytic tools for businesses. According to analysts, only a small fraction of business people use powerful analytics tools as part of their decision making today1. Watson Analytics is designed to make advanced and predictive analytics easy to acquire and use.


Read the entire press release and more HERE.

Tuesday, September 16, 2014

IBM Positioned as a Mobile Application Development Platform Leader in Gartner Magic Quadrant

ARMONK, N.Y. - 15 Sep 2014: IBM (NYSE: IBM) today announced that Gartner, Inc. has positioned IBM as a Leader in the 2014 Magic Quadrant for Mobile Application Development Platforms.1

For the report, Gartner evaluated the IBM MobileFirst application development portfolio that includes a complete range of tools for developers to create, deploy, manage and secure mobile apps, on-premise or in the cloud.

According to Gartner, “Leaders must represent a strong combination of ability to execute and completeness of vision. In the mobile application development platform (MADP) sector, this means that Leaders not only are good at cross-platform development, deployment and management across the full life cycle, but also have good vision of the multichannel enterprise, support for multiple architectures and standards, a solid understanding of IT requirements, and scalable channels and partnerships. Leaders must provide platforms that are easy to purchase, program, deploy and upgrade, and which can connect to a range of back-end and cloud services, from the same vendor as well as third parties.”

A key component of the IBM MobileFirst portfolio, IBM recently announced several enhancements to the IBM Worklight platform to address the evolving needs of mobile app developers, including those increasingly incorporating analytics and cloud-based services to quickly build and deploy mobile apps. Other major components of the IBM MobileFirst portfolio include integrated software and services for mobile management, payments, security and engagement.

"The need for mobile apps that maximize the user experience and spur transactions is exploding. With that rising demand, organizations need to rapidly build, secure, manage and integrate those mobile apps with their back-end systems to drive better decision making," said Phil Buckellew, vice president, enterprise mobile, IBM. "We feel this recognition reinforces how IBM is redefining the mobile application development platform and putting a rich set of tools and cloud-based services into the hands of the world’s developers so they can focus on creating exceptional interactions.”

IBM Worklight allows enterprises to optimize mobile user experiences by supporting both native (via
SDKs) and hybrid development models as well as tracking user experience with sentiment analysis and crowd-sourced feedback submissions. The platform helps developers integrate analytics, workflow and back-end systems, and ensure greater enterprise security and version management. IBM Worklight features mobile management and security capabilities for scanning apps to identify vulnerabilities early in development cycles and assist with determining problems with apps that have already been deployed.

Earlier this year, the IBM MobileFirst portfolio was recognized as a Leader in both the 2014 Gartner Magic Quadrant for Managed Mobility Services (MMS)2 and the Magic Quadrant for Enterprise Mobility Management Suites.3

About IBM MobileFirst
IBM’s 5,000 mobile experts have been at the forefront of mobile enterprise innovation. IBM has secured more than 4,300 patents in mobile, social and security, which have been incorporated into IBM MobileFirst solutions that enable enterprise clients to radically streamline and accelerate mobile adoption, help organizations engage more people and capture new markets. Through IBM's partnership with Apple, the two organizations are transforming enterprise mobility with a new class of industry specific business apps.

For more information on IBM MobileFirst, visit the press kit or www.ibm.com/mobilefirst. Follow @IBMMobile on Twitter, and see IBM MobileFirst on YouTube, Tumblr and Facebook.

1 – Gartner, Magic Quadrant for Mobile Application Development Platforms - Ray Valdes, Van L. Baker, Richard Marshall, Jason Wong, 2 September 2014
2 – Gartner, Magic Quadrant for Managed Mobility Services - Eric Goodness, Gianluca Tramacere, Katja Ruud, 24 July 2014
3 – Gartner, Magic Quadrant fo

Monday, September 15, 2014

Can't make the next MaaS 360 live Webinar? Check out these on-demand webinars...

iOS 8 Announcement: Enterprise Implications to Consider 
(http://www.maas360.com/zf/IBM/693)
  • Is your mobile enterprise ready for iOS 8? Your users will be upgrading fast and IBM MaaS360 will be ready for you to support them instantly! iOS 8  and MaaS360 make iPhones and iPads even better for work with features that enhance productivity, elevate security and ease management of devices, apps and content.  Join our Product Manager, Josh Lambert, as he discusses how you can leverage all the powerful new enterprise features in your business.

On-Demand Webinar:  Samsung Knox™ on Galaxy S®5 with MaaS360 for Business  
(http://www.maas360.com/zf/IBM/646)
  • Back by popular demand for our international audience! Securing enterprise data becomes more challenging with each new device. From smartphones and tablets to wearable technology, employees are demanding flexibility and privacy while corporate, regulatory, and legal imperatives require precise policy enforcement.
  • Join Mike Mogodam and Natalie Huynh from Samsung Mobile and Mobile MaaSter Jay Allen for a live, interactive webinar. In this session you will learn how Samsung Knox with enhancements on the Galaxy S5 and MaaS360 will deliver the mobile security you need, without compromising the privacy of your employees. Samsung devices have been validated through Common Criteria and FIPS and can be managed conveniently with MaaS360.

On-Demand Webinar: Wearable Applications for the Enterprise: Google Glass and Beyond 
(http://maas360.com/zf/IBM/656)
  • While Google Glass has yet to land on the heads of everyday consumers, it is already making inroads in the enterprise. For new and emerging technologies, there are infrastructure, security and deployment challenges. The intimate and highly personal nature of wearable computing also brings with it new demands for developers, designers and business managers.
  • Join BrickSimple as they share their experiences developing, deploying and managing wearable applications in corporate environments.

On-Demand Webinar: Microsoft Steps Up its EMM Game with Windows Phone 8.1 
(http://www.maas360.com/zf/IBM/640)
  • Join Windows Phone MaaSters Chuck Brown and Jimmy Tsang for an overview of the new features and controls on Windows Phone 8.1 such as Wi-Fi and VPN profile settings, device controls and restrictions (such as location, NFC, Bluetooth, camera and screen capture), enhanced application management including blacklist/whitelist and silent install and streamlining of the MaaS360 onboarding process.

On-Demand Training: Setting Up Your MaaS360 Portal 
(http://trials.maas360.com/forms/register_service_m.php?id=608&P=IBMMKT01)
  • Are you ready to start using MaaS360 for Mobile Device Management (MDM)? Let us show you how easy it is to have your devices up and running in minutes. After a few simple steps, you can securely manage iOS, Android, and Windows Phone devices from the MaaS360 portal.

On-Demand Webinar: The Building Blocks of a Secure Mobile Strategy 
(http://trials.maas360.com/forms/register_service_m.php?id=616&P=IBMMKT01)
  • There's more to mobile security than meets the eye: user and device security, application security, document security, email security and network security. Set yourself up for success with a structured and proven approach to mobile security!  Join Fiberlink's Information Security Officer, David Lingenfelter, and special guest, IDC Analyst Stacy Crook as they describe best practices around mobile security in the enterprise, and outline a step-by-step process to help you develop a solid mobile security strategy. IDC will draw on current research from its Mobile Enterprise Software practice to highlight the current state of mobile security in the enterprise, best practices, gaps, and key trends.

Additional On-Demand Webinars available at: http://www.maas360.com/resources/webinars/

iOS 8: Are you ready? MaaS360 is! (Live Demo)

Join our upcoming live demo to learn about the tools available to help you manage the iOS devices (including iOS 8) on your corporate network.

Title: Live Demo: See iOS 8 and IBM MaaS360 in Action

Abstract:  iOS 8 is set to launch on September 17. Join us the next day to see how the powerful new management and security tools will help you:
  • Gain more visibility and control with iOS devices
  • Protect the flow of information on work devices
  • Boost productivity with enhanced access to content and apps
  • Make life easier for you and your user
Our Mobile MaaSters will take a deep dive during this tour of the IBM MaaS360 platform, optimized for iOS 8. Our experts will answer your questions about how to start supporting iOS 8 in your business.

Date and Time:  Thursday September 18th at 2pm Eastern -REGISTER HERE-

Friday, September 12, 2014

Call for Speakers for Interconnect 2015 is Now Open

Call for Speakers! Limited Spots Available!
Last date to submit your proposal - Oct 2nd!

Three extraordinary IBM conferences—Pulse, Impact, and Innovate—are joining forces to deliver one of the most comprehensive software events ever as IBM InterConnect 2015 on February 22 – 26 in Las Vegas, Nevada. Because you’re passionate about innovation, I want to extend an invitation for you to speak at the event and share your expertise on using IBM Endpoint Manager to transform your business.

We’re focusing on five major areas this year, and would like your presentation to align to one of these areas to tell a compelling story about how you use IBM Endpoint Manager inside your organization. Specifically, we’d like to know how you’ve been able to:
  • Cut costs and downtime of managing and securing datacenter and remote servers.
  • Ensure continuous security and compliance and keep your company out of the news for the wrong reasons.
  • Reduce cost, risk, and complexity of managing desktops, laptops, and other devices.
  • Maintain audit readiness and continuous license compliance with always-on Software Asset Management.
  • BYOD: Securely manage the mobile enterprise

What’s in it for you:
  • IBM InterConnect is among the biggest events of its kind — we’re expecting over 20,000 attendees—and have the opportunity to attend sessions, get professional education and technical certifications valued at over US $8,000.*
  • Unparalleled opportunities to network with literally thousands of industry experts, thought leaders, and colleagues in a venue focused on the kind of innovations that matter to you. 
  • Showcase your own skills and expertise and establish yourself as a thought leader in front of industry experts and cohorts from around the globe. Elevate your career by sharing how you’re using IBM Endpoint Manager to transform your business.

Follow this link to submit a proposal to speak at InterConnect today. Session proposals will be accepted from now until October 2nd. All accepted speakers may be eligible for free conference passes. Only a limited number of spots are available.
Paper requirements:  Your proposal must include a presentation title and a well-written abstract of approximately 100 words that reflects an organized description of what the presentation will cover.

Timeline for submissions:
  • Call for Speakers closes: 02 October 2014
  • Speakers will be notified: 20 October 2014
  • Presentation drafts due: 14 January 2015
Please don't hesitate to contact me if you have any questions. I look forward to seeing you at InterConnect!

Wednesday, September 10, 2014

Upcoming Endpoint & Mobility Management Webcast - Oct. 1st

Wednesday, October 1st, 2014 @ 11:00 am Eastern

Heartbleed: How to avoid hemorrhaging data
by automating your data center

It's been a banner year for hackers, with security breaches appearing regularly in the news, causing
significant damage for a number of well-known companies. In a climate where budgets are decreasing and attacks are increasing in both number and sophistication, your servers (physical and virtual) located both within the data center and in remote geographic locations are a prime target for these hackers -- it provides the greatest ROI for a would-be attacker looking to exploit your vulnerabilities and security gaps.

How do you ensure your data centers are protected against these increasingly sophisticated attacks while dealing with decreasing budgets and resource constraints?

Join senior IBM expert, Mike Gare, to learn how you can take steps to protect your data center while using automation to streamline and cut operating costs thereby increasing efficiency and ensuring a more robust security posture.