April 7, 2017 By John Harrington Jr. 3 min read

Whether your organization is taking its initial strides towards its digital transformation or is already far along, it’s important to stop and consider the ways in which it can stay strong at the core along the way. In fact, its future success will hinge on it.

Ginni Rometty, CEO of IBM, dedicated much of her Chairman’s Address at InterConnect 2017 to the notion of “enterprise strong at the core,” stressing its paramount importance to modern businesses and a formula to be followed for future success.

As Ginni shared with over 10,000 customers and business partners in attendance, it begins and ends with data. From her perspective, a company’s ability to not only manage data, but also secure it, will separate the winners from the losers.

Watch the on-demand webinar: MaaS360 with Watson allows Security leaders to approach UEM differently

Having the same level of security and control over devices, the Internet of Things (IoT), users, apps and content is tantamount. After all, there are sensors that use proprietary data in countless ways, whether in creating, storing, accessing or transmitting.

With so many disparate yet intricately connected endpoints spanning far and wide across the globe, cognitive intelligence will be crucial to make sense of the data that they generate, use and distribute — not only to glean insights and analytics from it, but to secure the enterprise and deliver business results.

Understanding the AT&T and IBM Partnership

When Randall Stephenson, CEO of AT&T, joined Ginni on stage for the keynote, he reinforced each of her points and also went on to describe how his company has been using IBM MaaS360 to address each of these factors head on.

https://youtu.be/9O2PnV_6-O8

According to Randall, AT&T’s predominant enterprise customer challenges rest in protecting network access to company data from disparate endpoints, meaning everything from smartphones to sensors.

With MaaS360, AT&T makes it possible to lock down and secure all devices, whether they are smartphones, tablets, laptops or desktops. Beyond the devices themselves, it protects their data and apps, grants access to public and private cloud resources, and virtually provides a private network experience.

Furthermore, Randall intimated that AT&T and IBM afforded customers the game-changing ability to aggregate data intelligence in the cloud at the device, app and network levels. As Randall put it, there aren’t “too many companies that can come together and create a value proposition as strong as something like this.”

Helping the US Government Secure Thousands of Endpoints With IBM MaaS360

It’s even easier to see the value when it’s put into practice. This is where Randall describes the poster child: a U.S. government agency that uses MaaS360, Watson, intelligence services and security services — all from IBM — to secure over 27,000 endpoints.

https://youtu.be/jnwInooeYEU

As Randall describes, it’s as simple as providing access to a safely contained application on a MaaS360-enabled device, which in turn gives each user a seamless access route to the cloud environment they depend on for work, all through a virtual private network experience afforded by AT&T.

It sounds simple because it is. This level of security and connectivity is critical today, especially in highly regulated industries.

This is just one example of how MaaS360 keeps enterprises strong at the core. With Watson, the cases for MaaS360 will continue to grow in number and significance for businesses of all sizes across all industries. The industry’s first and only cognitive approach to unified endpoint management (UEM) gives customers the power to see what happened, what can happen and what should be done, all in the context of their environment.

Watch our on-demand webinar to learn more about MaaS360 with Watson and begin taking steps to transform your business.

Watch the on-demand webinar

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today