advanced mobile content collaboration with box.net

33
© 2015 IBM Corporation With Box and IBM Kaushik Srinivas, IBM Tosin Onafowokan, Box Simon Cooper, IBM IBM Security August 25, 2015 Advanced Mobile Content Collaboration

Upload: agilly

Post on 09-Jan-2017

228 views

Category:

Software


1 download

TRANSCRIPT

Page 1: Advanced Mobile Content Collaboration with BOX.NET

© 2015 IBM Corporation

With Box and IBM

Kaushik Srinivas, IBM Tosin Onafowokan, Box Simon Cooper, IBM IBM Security August 25, 2015

Advanced Mobile Content Collaboration

Page 2: Advanced Mobile Content Collaboration with BOX.NET

2 © 2015 IBM Corporation

Housekeeping items

Duration – 60 minutes Submit your questions to all

panelists in the Q&A box located in the bottom right corner of your screen

Recording and slides will be emailed to you tomorrow

Page 3: Advanced Mobile Content Collaboration with BOX.NET

3 © 2015 IBM Corporation

Introductions

Kaushik Srinivas Product Manager

IBM

Tosin Onafowokan Product Manager

Box

Simon Cooper Mobile Me Initiative Lead

IBM

Page 4: Advanced Mobile Content Collaboration with BOX.NET

4 © 2015 IBM Corporation

Box overview The Box + IBM Partnership Box for EMM

–MaaS360 + Box for EMM –Demo Fireside Chat with the IBM CIO Team

Agenda

Page 5: Advanced Mobile Content Collaboration with BOX.NET

© 2015 IBM Corporation

Box Overview Tosin Onafowokan, Box

Page 6: Advanced Mobile Content Collaboration with BOX.NET

6

This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding the integration of Box’s and IBM’s technologies, solutions and services, and the benefits that are expected to result to Box, IBM, their customers and other stakeholders from the partnership between Box and IBM. Statements including words such as “anticipate”, “believe”, “estimate”, “upcoming”, “soon”, “expect”, “can”, “future” or “will” and statements in the future tense are forward-looking statements. The achievement or success of the matters covered by such forward-looking statements involves risks, uncertainties and assumptions, which, if they do not fully materialize or prove incorrect, could cause the results of the partnership between Box and IBM to differ materially from those expressed or implied by such forward-looking statements. These risks, uncertainties and assumptions include, but are not limited to, risks associated with changes in product plans or roadmaps; product development or integration delays; market acceptance of the companies’ combined products and services; and changes in the relationship between Box and IBM due to the business environment, competitive factors or other factors. Further information on these and other factors that could affect the partnership between Box and IBM or the financial results derived therefrom, can be found in the documents that Box and IBM have filed with or furnished to the Securities and Exchange Commission, including the most recent Forms 10-K and 10-Q filed by each company. All forward-looking statements in this presentation are based on information available to Box and IBM as of the date hereof. Neither Box nor IBM assumes any obligation, nor do they intend to update these forward-looking statements to reflect events that occur or circumstances that arise after the date on which they were made.

Safe Harbor Language: This presentation contains forward-looking statements.

Page 7: Advanced Mobile Content Collaboration with BOX.NET

7

People are a company’s most important asset

Page 8: Advanced Mobile Content Collaboration with BOX.NET

8

Information is their most important resource

Page 9: Advanced Mobile Content Collaboration with BOX.NET

9

How people work with information has completely changed

Cloud

New Engagement Models

Proliferation of Data

Page 10: Advanced Mobile Content Collaboration with BOX.NET

10

They need a new set of secure solutions to stay connected, competitive and productive

Page 11: Advanced Mobile Content Collaboration with BOX.NET

11

A strategic partnership leveraging each company’s unique strengths to

transform work in the cloud

11

Page 12: Advanced Mobile Content Collaboration with BOX.NET

12

Page 13: Advanced Mobile Content Collaboration with BOX.NET

13

Over 47,000 organizations choose Box for secure cloud-based content management and collaboration

Page 14: Advanced Mobile Content Collaboration with BOX.NET

14

37MM+ Users

47K+ Customers

51% Fortune 500

14

Page 15: Advanced Mobile Content Collaboration with BOX.NET

15

Change the way you work with information

Instant mobile productivity

Best-in-class enterprise security

Box is a platform for transforming how enterprises work

Platform

Page 16: Advanced Mobile Content Collaboration with BOX.NET

16

Modern end-user experiences

Work on any device

Access to your work from anywhere

Fast preview automatic syncing

Visually stunning 3D images and videos

Unlimited files & folders and large files

Page 17: Advanced Mobile Content Collaboration with BOX.NET

17

Make end-user adoption simple

Use your favorite productivity tools – Office 365, GApps, etc.

Enable effortless yet secure daily use and access with SSO

Reduce bandwidth and security concerns - avoid email attachments

Simplify mobile, external access and collaboration

Automatically preserve security policies and controls

Page 18: Advanced Mobile Content Collaboration with BOX.NET

18

How Companies Use Box

Infrastructure Replacement Save money, simplify, and focus on success

Consumer Consolidation Reduce liability, provide sanctioned tools

Enterprise Mobility Making every device productive and managed

Custom App Development Making the platform a core part of IT strategy

Next Gen Collaboration Keep teams in sync and projects on track

Page 19: Advanced Mobile Content Collaboration with BOX.NET

19

Box is the Market Leader

Page 20: Advanced Mobile Content Collaboration with BOX.NET

20

Box and IBM will jointly develop a portfolio of solutions for the digital enterprise

Box and IBM will deliver these solutions and serve customers together globally

20

Page 21: Advanced Mobile Content Collaboration with BOX.NET

© 2015 IBM Corporation

Box for EMM Kaushik Srinivas, IBM

Page 22: Advanced Mobile Content Collaboration with BOX.NET

22 © 2015 IBM Corporation

Page 23: Advanced Mobile Content Collaboration with BOX.NET

23 © 2015 IBM Corporation

Page 24: Advanced Mobile Content Collaboration with BOX.NET

24 © 2015 IBM Corporation

Two integration points for MaaS360 + Box

MaaS360 integrations with Box

Page 25: Advanced Mobile Content Collaboration with BOX.NET

25 © 2015 IBM Corporation

Box app for Work managed by MDM Productivity focus:

Provides users a native Box mobile app experience

Security focus: Provides enterprises the access / data security controls needed to secure corporate data

Available for – iOS on iTunes – Android via enterprise app

What is Box for EMM?

Page 26: Advanced Mobile Content Collaboration with BOX.NET

26 © 2015 IBM Corporation

Access control – Authenticate user – Block user from accessing Box – Configure Box app for Username

(%email%) Separation of Work / Play Box

accounts – Users can continue to have the

regular Box app for personal accounts, and use Box for EMM for work

Other features available via core MDM – Selective wipe – Managed Open-in & Disable iCloud

Backup (iOS)

Features offered through Box for EMM

Page 27: Advanced Mobile Content Collaboration with BOX.NET

27 © 2015 IBM Corporation

Enterprise Admin distributes Box for EMM through the MaaS360 App management workflows

Admin enters a key provided by Box in the MaaS360 portal

Users download the app and login

Deploying Box for EMM through MaaS360

Page 28: Advanced Mobile Content Collaboration with BOX.NET

© 2015 IBM Corporation

MaaS360 Demo

Page 29: Advanced Mobile Content Collaboration with BOX.NET

29 © 2015 IBM Corporation

Fireside chat - Simon Cooper, Mobilize Me lead @ IBM CIO team 1. Why Box for EMM? 2. IBM environment 3. Total rollout time 4. Use cases 5. Prior Security analysis 6. Challenges & Takeaways 7. 2 year vision for the deployment

IBM internal deployment of Box for EMM

Page 30: Advanced Mobile Content Collaboration with BOX.NET

30 © 2015 IBM Corporation

Would you like more information? (a) Yes, please have Box contact me

(b) Yes, please have MaaS360

contact me

(c) Yes, please have both Box and

MaaS360 contact me

(b) No, not at this time

Poll question

Page 31: Advanced Mobile Content Collaboration with BOX.NET

31 © 2015 IBM Corporation

Page 32: Advanced Mobile Content Collaboration with BOX.NET

© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

THANK YOU www.ibm.com/security

Page 33: Advanced Mobile Content Collaboration with BOX.NET

© 2015 IBM Corporation

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right.

Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml

Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM.

U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.

Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business.

Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation.

It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law.

Legal notices and disclaimers