In response to COVID-19, many organizations have closed their offices and their employees are working from home. Employees are using a wide variety of mobile devices to continue doing their jobs. IBM MaaS360 takes an open cloud approach to manage devices that connect to your corporate resources and secure user behavior.
Mobile Security Courses:
This video walks you through how to secure access for Office365 with IBM Security Verify (Cloud Identity) and MaaS360. Along with the end to end demonstration, this video also covers the following topics:
- Why protect access to Office365
- Requirements for securing Office365
- Architecture overview for on mobile and an unmanaged device
- Configuration steps to secure Office365
Duration: 35 minutes
In this lab, you explore integrating IBM MaaS360, IBM security Verify (Cloud Identity), and Active Directory Federation Service (ADFS). In this scenario, Cloud Identity acts as an alternate IaaS (Identity as a Service) provider to ADFS so when ADFS detects a mobile device user, it redirects the authentication request to Cloud Identity. Cloud Identity works with MaaS360 to manage device compliance and enrollment requirements. This lab walks you through integrating all 3 tools in a cohesive, zero-touch, architecture that does not impact your business operations.
Whether it’s a document sent over Slack or a game of conference call bingo unfolding on Zoom, telecommuting infrastructure has permeated our working lives. The workplace and classroom have both transformed overnight from cubicles and desks to couches and kitchens.
As employees or students shift to working or learning from home, a diverse range of endpoints need to be managed and protected – including smartphones, tablets, and laptops. Cloud applications should also be deployed to support those trends—providing business continuity for organizations while enabling a frictionless experience for users. This is accomplished via unified endpoint management (UEM), identity and access management (IAM), and web-centric threat defense working in concert.
Further, it’s just as imperative to effectively secure those applications and the devices users rely on for access—whether an organization-issued laptop or a personal tablet.
A program like bring your own device (BYOD), while implying usage in the office, is more of a concern at home due to the risks of unsecured WiFi, unauthorized users, risky downloads and web traffic, and the potential for phishing attacks to compromise credentials.
However, those same problems tend to crop up on organization-issued devices as well—typically deemed a more secure asset. Ultimately, regardless of the device, the human behind the machine presents the risk.
Duration: 53 minutes
The lines between mobile and desktop computing continue to blur. Form-factors have converged, enabling more portable devices that can connect to the cloud at any time, from any location.
As organizations seek to support this modern workplace, mobile connectivity becomes critical for connecting employees, contractors, and partners with data and applications. Mobile empowers workers to be productive in new, innovative ways. But it also challenges IT to rethink how services are delivered in an efficient, safe, and cost-effective manner.
Unified Endpoint Management (UEM) has emerged as the de-facto configuration and management platform for any type of device. But what about managing the always-on data connections made as users operate outside of the corporate campus?
IBM Security MaaS360 with Watson has partnered with Wandera to offer end-to-end management for the mobile experience, from device configuration to controlling the application usage on Windows 10.
In this video, experts from Wandera and IBM discuss how MaaS360 incorporates robust data controls for Windows 10 to deliver a consistent policy across all mobile devices, including:
- Flexible data controls that ensure always-on mobile connections are used responsibly to avoid surprise overages on enterprise cellular bills
- Mobile content filtering that applies category-based policies across applications and browsers to enforce acceptable use
Industry-leading network security features that defend against mobile phishing attacks, third-party app store downloads, and C2 traffic, inside and outside the office.
Duration: 32 minutes
This course provides a quick guide on the capabilities available within the MaaS360 secure browser, as well as, provide details on how to enable and deploy this application.
- Instructional Materials which includes IBM Knowledge Center, Guided Walk Throughs, Integrated Portal Tips, Contextual Help, and Support Search
- Continuous Learning which includes Ongoing Product Education, Product Notifications, Open Mic Webinars, IBM Security Community and MaaS360 Status Page
- MaaS360 Training which includes the MaaS360 Course Catalog, Training Roadmaps, Badges, and IBM Security VIP Rewards
- MaaS360 eNurture Programs which includes Weekly Technical Touchpoints, Community Blogs and Technical Events