IBM ISS Data Security Services for endpoint data protection

IBM United States Services Announcement 610-002
January 19, 2010

 
 ENUS610-002.PDF (42KB)

Table of contents   Document options  
Overview Overview Description Description
Planned availability date Planned availability date Prices Prices
 
Printable version Printable version

 
Top rule
At a glance
Bottom rule

IBM® ISS Data Security Services for endpoint data protection helps you with your endpoint device security services such as:

  • Software
  • Consulting
  • Implementation
  • Support desk

 
Back to topBack to top
 
Top rule
Overview
Bottom rule

IBM Data Security Services for endpoint data protection is designed to address your needs for data security on user endpoint devices such as:

  • Laptop computers
  • Desktop computers
  • Smart phones and personal digital assistants (PDAs)

The service includes the following components:

  • Endpoint data security software solutions
  • Consulting and implementation security services

For a complete list and description of the IBM Data Security Services for endpoint data protection service components, refer to the Description section of this announcement.


 
Back to topBack to top
 
Top rule
Planned availability date
Bottom rule

January 19, 2010


 
Back to topBack to top
 
Top rule
Description
Bottom rule

Professional security services

  • IBM ISS Data Security Services for endpoint data protection - endpoint encryption requirements and planning workshop
    • Objective of this workshop is to help you better understand your business, IT, and compliance requirements for data encryption on endpoint devices and start a high-level planning approach for deployment of your endpoint encryption solution.
  • IBM ISS Data Security Services for endpoint data protection - endpoint encryption implementation
    • Designed to deliver a successful solution deployment in your environment which includes the following activities:
      • Solution architecture and design
      • Policy design
      • Implementation planning and project management
      • Pilot preproduction and production server builds
      • Creation of technical policies and rule definition
      • Pilot rollout and test
      • Enterprise rollout and deployment
      • Help desk deployment
      • Training and skills transfer
  • IBM ISS Data Security Services for endpoint data protection - endpoint data loss protection requirements and planning workshop
    • Objective of this workshop is to help you better understand your business, IT, and compliance requirements for data loss prevention on endpoint devices and start a high-level planning approach for deployment of an endpoint data loss prevention solution.
  • IBM ISS Data Security Services for endpoint data protection - endpoint data loss protection discovery assessment
    • This service is designed to provide you with a core sample of your data to support a business case for a data loss protection solution or planning service or for the deployment of a data loss protection solution on your endpoint devices.
  • IBM ISS Data Security Services for endpoint data protection - endpoint data loss protection implementation
    • Deliver a successful solution deployment in your environment which includes the following activities:
      • Solution architecture and design
      • Policy design
      • Implementation planning and project management
      • Pilot preproduction and production server builds
      • Creation of technical policies and rule definition
      • Pilot rollout and test
      • Enterprise rollout and deployment
      • Help desk deployment
      • Training and skills transfer

Accessibility by people with disabilities

A U.S. Section 508 Voluntary Product Accessibility Template (VPAT) containing details on accessibility compliance can be requested at

http://www.ibm.com/able/product_accessibility/index.html

 
Back to topBack to top
 
Top rule
Prices
Bottom rule

For pricing information, contact your IBM Internet Security Systems™ representative at 1-800-776-2362.

Trademarks

Internet Security Systems is a trademark of IBM Corporation in the United States, other countries, or both.

IBM is a registered trademark of IBM Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

http://www.ibm.com/legal/us/en/

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/

 

Back to topBack to top
 
Bottom grey rule
 
Printable version Printable version