SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
© 2015 IBM Corporation
Enabling the enterprise
for the way the world works
Presenter
Title
IBM Security
June 13, 2016
IBM Mobile Security
2© 2015 IBM Corporation
by 2017
Mobile downloads
will increase to
268 billion
Gartner
by 2016
The number of smartphone
users worldwide will surpass
2 billion
eMarketer
Enterprise mobile trends
“Enterprise mobility will continue to be one of the hottest topics in IT,
and high on the list of priorities for all CIOs.”
Ovum
“IT organizations will dedicate at least 25% of their software budget
to mobile application development, deployment, and management by 2017.”
IDC
3© 2015 IBM Corporation
387new threats
every minute or more
than six every second
McAfee
As mobile grows, so do security threats
“With the growing penetration of mobile devices in the enterprise, security testing
and protection of mobile applications and data become mandatory.”
Gartner
“Enterprise mobility… new systems of engagement.
These new systems help firms empower their customers, partners,
and employees with context-aware apps and smart products.”
Forrester
Arxan
Top mobile devices
and apps hacked 97%Android
87%iOS
4© 2015 IBM Corporation
What concerns does this create for the enterprise?
Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity”
32% are concerned about
fraudulent transactions
Only 18% can detect
malware / jailbreaks
52% worry about
application vulnerabilities
Only 23% have
tamper-proofing capabilities
50% are content and data leakage
are their top security concern
60% use secure containers
for data security
57% say a lost or stolen device
is top concern
60% use passcodes
for device security
5© 2015 IBM Corporation
MobileFirst
Protect (MaaS360)
AppScan, Arxan, Trusteer M;
bile SDK
IBM Mobile Security Framework
AirWatch, MobileIron, Good,
Citrix, Microsoft, Mocana
HP Fortify, Veracode, Proguard CA, Oracle, RSA
• Manage multi-OS BYOD
environment
• Mitigate risks of lost and
compromised devices
• Separate enterprise
and personal data
• Enforce compliance
with security policies
• Distribute and control
enterprise apps
• Build and secure apps
and protect them
“in the wild”
• Provide secure web,
mobile, API access
and identify device risk
• Meet authentication
ease-of-use expectation
Extend Security Intelligence
• Extend security information and event management (SIEM) to mobile platform
• Incorporate mobile log management, anomaly detection, configuration and vulnerability management
Manage Access
and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
6© 2015 IBM Corporation
IBM Mobile Security Portfolio
IBM
Security
Access
Manager
IBM
DataPower
Gateway
IBM
BigFix
IBM
MobileFirst
Platform
IBM
MobileFirst
Protect
MaaS360
IBM
Security
AppScan
Arxan
Application
Protection
for IBM
Solutions
IBM QRadar
Security
Intelligence
Platform
IBM
Security
Trusteer
IBM
Mobile
Security
Services
7© 2015 IBM Corporation
Protecting devices
Every three minutes, a mobile device is wiped
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
46%
say their smartphone
is something they couldn’t live without
Source: “6 facts about Americans and their smartphones”
by Pew Research Center, April 2015
87%
By 2017, mobile devices will make up
of Internet-enabled
technology total sales
Source: Lander Blog, “Five Online Marketing Trends for 2014,
April 2014
Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014
87%
have their smartphone
at their side,
day and night
78%
spend over 2 hours
a day using their
smartphones
68%
consider their
smartphone to be
a personal device
Millennials and their smartphones…
8© 2015 IBM Corporation
How do you protect your devices?
 Identify devices at risk
pre/post deployment?
 Ensure devices accessing
the network are encrypted?
 Mitigate risks of lost and
compromised devices?
 Identify and respond
to any device accessing
your corporate data?
 Deploy and manage a
multi-OS environment with BYOD?
 Remotely provision
policies and restrictions?
9© 2015 IBM Corporation
Deploy, manage and secure devices while mitigating
the risks of lost and compromised devices
Rapidly deploy devices
Streamline the device
provisioning, configuration
and enrollment process for
enterprise use over the air
Centrally manage devices
Embrace BYOD, corporate,
and shared device with
centralized policy and
control from a single console
Proactively secure devices
Implement dynamic policies
and compliance rules to
continuously monitor devices
and take automated action
10© 2015 IBM Corporation
Large manufacturer deploys successful BYOD program
with IBM MobileFirst Protect
Client securely enabled mobility from the corporate office worker
to the field service representative to better serve customers while
keeping sensitive data secure.
11© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Securing content and collaboration
“Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014
59% allow employees to share or collaborate on documents
if the company provides the mobile device
64%
"73 Astonishing E-Mail Marketing Statistics You Need to Know", Mark the Marketer, February 2014
of decision-makers read their
e-mail via mobile devices
60% of employees access content
from outside the office
“Productivity Anywhere, Anytime: Mobilize Your Business”, Box
12© 2015 IBM Corporation
How do you secure content and collaboration?
• Separate enterprise
and personal data?
• Prevent data leakage?
• Provide secure access
to sensitive data
• Enforce compliance
with security policies?
13© 2015 IBM Corporation
Separate enterprise and personal data enforcing
compliance with security policies
Enable the secure web
Provide access to intranet
sites and web apps, URL
filtering, and restrict cookies,
downloads, copy / paste
and print features
Separate work email
Contain email text and
attachments to prevent
data leakage, enforce
authentication, copy / paste
and forwarding restrictions
Collaborate on content
Ensure the availability of files
from repositories with
authentication, DLP controls,
secure edit and sync,
and selective wipe
14© 2015 IBM Corporation
A retail store chain uses IBM MobileFirst Protect
for faster service to its customers
Client empowered in-store customer service representatives with
shared smart devices to securely view inventory and merchandise
information while on the store floor.
15© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Safeguarding applications and data
2.2
Kaspersky Lab “IT Threat Evolution Report for Q1 of 2015”
billion malicious attacks on
computers and mobile devices
were blocked during Q1 2015
Gartner Press Release, May 2014
of all mobile security
breaches are through apps75%overall mobile app usage
grew in 201476%
Shopping, Productivity and Messaging Give Mobile
Another Stunning Growth Year”, Flurry Insights, January 2015
On average, a company tests less than
half of the mobile apps they build and…
never test apps to ensure
they are secure33%
Ponemon The State of Mobile Application Insecurity, February 2015
16© 2015 IBM Corporation
How can you safeguard applications and data?
• Develop secure mobile apps
and assess the security
of existing apps
• Secure apps against reverse
engineering and runtime
attacks
• Prevent deployment
of risky mobile apps
• Protect app data at rest
and in motion
• Distribute and control public
and enterprise apps
17© 2015 IBM Corporation
Build, test and secure mobile apps before distributing
to end users
Safely distribute apps
Deploy custom enterprise
app catalogs; blacklist,
whitelist and require
apps; administer app
volume purchase
programs
Test app security
Identify vulnerabilities
in development and
pre-deployment;
isolate data leakage
risks; ensure proper
use of cryptography
Protect apps
Harden mobile apps
to defend against
reverse engineering;
prevent repacking
of apps; protect apps
from mobile malware
Secure app data
Protect enterprise apps
with authentication,
tunneling, copy / paste
restrictions and prevent
access from
compromised devices
18© 2015 IBM Corporation
A hospital uses IBM Mobile Security to build a secure
and protected patient care app
Doctors, nurses, and non-hospital employees share timely patient
information and test results on multiple devices to manage care
while protecting sensitive information
19© 2015 IBM Corporation
Manage access and fraud
“The CyberVor gang amassed over 4.5billionrecords,
mostly consisting of stolen credentials.
To get such an impressive number of credentials,
the CyberVors robbed over 420,000 web and FTP sites.”
Hold Security
$6.53 millionaverage cost of a U.S. data breach
2015 Cost of Data Breach Study, Ponemon Institute
95% of financial services incidents
involve harvesting credentials
stolen from customer devices
2015 Verizon Data Breech Report
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
“The CyberVor gang amassed over 4.5 billion
records, mostly consisting of stolen credentials. To get such an impressive
number of credentials, the CyberVors robbed over 420,000 web and FTP sites.”
Hold Security
$6.53 million
average cost of a U.S. data breach
2015 Cost of Data Breach Study, Ponemon Institute
95% of financial services incidents
involve harvesting credentials
stolen from customer devices
2015 Verizon Data Breech Report
20© 2015 IBM Corporation
How can you manage access and fraud?
 How do you deliver mobile security
capabilities in a consistent manner
to address:
- Web services / APIs
- Traditional web access
 How do you maintain mobility
authentication ease-of-use
expectations?
 Can you ensure that security features
are not being sacrificed as the pace
of mobile development and
deployment accelerates?
 Can you prevent access from high
risk or compromised mobile devices?
21© 2015 IBM Corporation
Prevent unauthorized access and transactions
by mobile users
Adaptive access
polices
Dynamic and adaptive
access policies provide risk
and context aware policy
enforcement while maintaining
ease-of-use expectations
Consolidated
enforcement point
A single point of secure
access control and
authentication for APIs
and mobile apps enabling
mobile single-sign-on
Integrated device
risk management
Manage risk from rooted /
jailbroken devices and from
mobile malware integrated
into access control polices and
BYOD content management
22© 2015 IBM Corporation
Company and independent agents access policy information in
corporate offices or field, access policies dynamically change based
on risk factors to ensure confidentiality and compliance
An insurance company uses IBM Security Access Manager
and Mobile Threat Management to keep customer data safe
23© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Extend security intelligence
Annual Threat Report on Advanced Targeted Attacks, Mandiant
Attackers spend an estimated
243 days on a victim’s network
before being discovered
Annual U.S. cost of a cyber-crime is
$11.56 million
per organization
Cyber-Crime Costs Continue to Rise: Study, eWeek
63%of victims were made aware
of breaches by an external organization
Annual Threat Report on Advanced Targeted Attacks, Mandiant
24© 2015 IBM Corporation
How can you extend security intelligence?
 Increasingly
sophisticated
mobile attack methods
 BYOD resulting in
disappearing
perimeters
 Accelerating mobile
security breaches
 Infrastructure changing
to support mobile
 Too many products from
multiple vendors; costly
to configure and manage
 Inadequate and
ineffective tools
 Struggling security teams
 Mobile providing
additional data sources
with limited manpower
and skills to manage it all
 Managing and monitoring
increasing compliance
demands
25© 2015 IBM Corporation
Gaining insights across the entire security event timeline
Prioritize Events
Quickly analyze very large
volumes of collected data
(events and logs) to get to
a manageably small number
of true incidents to be further
analyzed
Identify Threats
Detect configuration errors
and other deviations from
the norm in order to gain
awareness of vulnerabilities
and assess exposures
Take Corrective Action
Dramatically reduce the
time to remediation and
increase the thoroughness
of that remediation
26© 2015 IBM Corporation
An international energy company parses billions
of events per day to find those that should be investigated
An international energy firm analyzes
2 billion
events per day to find 20-25potential offenses to investigate
27© 2015 IBM Corporation
Summary
 Enterprise mobility management is needed and necessary
 MDM is a good place to start but additional security required
 Need to account for device risk
 Must build secure mobile apps
and must secure apps “in the wild”
 Identity and access security must be
adaptive – contextually aware
Think of mobile security more holistically
• Broader than MDM
• Think… device, content, application, and access
• More than a collection of point products
• Must scale to address enterprise requirements
28© 2015 IBM Corporation
Learn more about IBM Security
V2015-11-23
countries where IBM delivers
managed security services
industry analyst reports rank
IBM Security as a LEADER
enterprise security vendor
in total revenue
clients protected
including…
130+
25
No. 1
12K+
90% of the Fortune 100
companies
Join IBM X-Force Exchange
xforce.ibmcloud.com
Visit our website
ibm.com/security
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM has
not tested those products in connection with this publication and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers
of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM
EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant
any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
Other company, product, or service names may be trademarks or service marks of
others. A current list of IBM trademarks is available at “Copyright and
trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this
document may be reproduced or transmitted in any form without written permission from
IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have
not yet been announced by IBM) has been reviewed for accuracy as of the date of initial
publication and could include unintentional technical or typographical errors. IBM shall
have no responsibility to update this information. THIS document is distributed "AS IS"
without any warranty, either express or implied. In no event shall IBM be liable for any
damage arising from the use of this information, including but not limited to, loss of data,
business interruption, loss of profit or loss of opportunity.
IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to
change or withdrawal without notice. Performance data contained herein was generally
obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may
have achieved. Actual performance, cost, savings or other results in other operating
environments may vary. References in this document to IBM products, programs, or
services does not imply that IBM intends to make such products, programs or services
available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent
session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to,
nor shall constitute legal or other guidance or advice to any individual participant or their
specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements
and to obtain advice of competent legal counsel as to the identification and interpretation
of any relevant laws and regulatory requirements that may affect the customer’s business
and any actions the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products will ensure that
the customer is in compliance with any law.
Legal notices and disclaimers
31© 2015 IBM Corporation
IBM is the ONLY leader in 8 Mobile related Gartner Magic
Quadrants
Enterprise Mobility
Management Suites
June 2015
Client Management
Tools
May 2014
Managed Mobility
Services
July 2014
Mobile Application
Development Platforms
August 2015
Application
Security Testing
August 2015
Security Information
and Event Management
July 2015
Enterprise Content
Management
September 2014
Identity, Governance,
Access
August 2014
32© 2015 IBM Corporation
Securely manage the diversity of endpoints
IBM BigFix and IBM MobileFirst Protect
Any device
 Identify and respond to any device accessing your
corporate data—regardless of what type it is or
whether it’s personal or corporate-owned
Any data
 Protect corporate and sensitive apps, content and
transactions in a secure container, whether in motion
or at rest, preventing costly data loss scenarios
Any location
 Manage and secure every unique device—whether it’s
on or off your corporate network—anywhere on the
planet
Any time
 Get real-time visibility and control of every device on
your network; find and fix problems in minutes—before
they become major disruptions
Consolidated view of managed endpoints
33© 2015 IBM Corporation
Leading expertise to help optimize your security program
Deploy
Optimize
Build
Plan
Design
 Identify capability gaps, plan and deploy
a robust strategy and roadmap to close them
 Gain insight to prioritize security investments
 Deploy intelligence-driven security capabilities
 Optimize your ability to react to and
contain events, while reducing impact
SOC Transformation
Build next generation security operations
Security Maturity
Assess and transform your security posture
Metrics
Technology
Governance
Process
Organization
IBM Security Strategy, Intelligence and Operations Consulting Services

Mais conteúdo relacionado

Mais procurados

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)IAMCP Canada
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 

Mais procurados (20)

8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

Destaque

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0RMayo22
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 

Destaque (6)

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
BFGC 3.0
BFGC 3.0BFGC 3.0
BFGC 3.0
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 

Semelhante a IBM Seguridad Móvil - Acompaña tu estrategia BYOD

Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8John Palfreyman
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7ibmmobile
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityRapidSSLOnline.com
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 

Semelhante a IBM Seguridad Móvil - Acompaña tu estrategia BYOD (20)

Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7An Overview on IBM MobileFirst Platform v7
An Overview on IBM MobileFirst Platform v7
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Evaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise MobilityEvaluate Top Seven Risks of Enterprise Mobility
Evaluate Top Seven Risks of Enterprise Mobility
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 

Mais de Camilo Fandiño Gómez

Mais de Camilo Fandiño Gómez (11)

IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
IBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Conoce la Seguridad Cognitiva
Conoce la Seguridad CognitivaConoce la Seguridad Cognitiva
Conoce la Seguridad Cognitiva
 
Top 10 razones para no necesitar un MDM
Top 10 razones para no necesitar un MDMTop 10 razones para no necesitar un MDM
Top 10 razones para no necesitar un MDM
 

Último

Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native BuildpacksVish Abrams
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.Sharon Liu
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxJoão Esperancinha
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLAlluxio, Inc.
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmonyelliciumsolutionspun
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesShyamsundar Das
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorShane Coughlan
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...OnePlan Solutions
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageDista
 

Último (20)

Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
Streamlining Your Application Builds with Cloud Native Buildpacks
Streamlining Your Application Builds  with Cloud Native BuildpacksStreamlining Your Application Builds  with Cloud Native Buildpacks
Streamlining Your Application Builds with Cloud Native Buildpacks
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
20240319 Car Simulator Plan.pptx . Plan for a JavaScript Car Driving Simulator.
 
Fields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptxFields in Java and Kotlin and what to expect.pptx
Fields in Java and Kotlin and what to expect.pptx
 
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/MLBig Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
Big Data Bellevue Meetup | Enhancing Python Data Loading in the Cloud for AI/ML
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine HarmonyLeveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
Leveraging DxSherpa's Generative AI Services to Unlock Human-Machine Harmony
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Watermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security ChallengesWatermarking in Source Code: Applications and Security Challenges
Watermarking in Source Code: Applications and Security Challenges
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS Calculator
 
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
Transforming PMO Success with AI - Discover OnePlan Strategic Portfolio Work ...
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
 

IBM Seguridad Móvil - Acompaña tu estrategia BYOD

  • 1. © 2015 IBM Corporation Enabling the enterprise for the way the world works Presenter Title IBM Security June 13, 2016 IBM Mobile Security
  • 2. 2© 2015 IBM Corporation by 2017 Mobile downloads will increase to 268 billion Gartner by 2016 The number of smartphone users worldwide will surpass 2 billion eMarketer Enterprise mobile trends “Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.” Ovum “IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.” IDC
  • 3. 3© 2015 IBM Corporation 387new threats every minute or more than six every second McAfee As mobile grows, so do security threats “With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory.” Gartner “Enterprise mobility… new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.” Forrester Arxan Top mobile devices and apps hacked 97%Android 87%iOS
  • 4. 4© 2015 IBM Corporation What concerns does this create for the enterprise? Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity” 32% are concerned about fraudulent transactions Only 18% can detect malware / jailbreaks 52% worry about application vulnerabilities Only 23% have tamper-proofing capabilities 50% are content and data leakage are their top security concern 60% use secure containers for data security 57% say a lost or stolen device is top concern 60% use passcodes for device security
  • 5. 5© 2015 IBM Corporation MobileFirst Protect (MaaS360) AppScan, Arxan, Trusteer M; bile SDK IBM Mobile Security Framework AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana HP Fortify, Veracode, Proguard CA, Oracle, RSA • Manage multi-OS BYOD environment • Mitigate risks of lost and compromised devices • Separate enterprise and personal data • Enforce compliance with security policies • Distribute and control enterprise apps • Build and secure apps and protect them “in the wild” • Provide secure web, mobile, API access and identify device risk • Meet authentication ease-of-use expectation Extend Security Intelligence • Extend security information and event management (SIEM) to mobile platform • Incorporate mobile log management, anomaly detection, configuration and vulnerability management Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices
  • 6. 6© 2015 IBM Corporation IBM Mobile Security Portfolio IBM Security Access Manager IBM DataPower Gateway IBM BigFix IBM MobileFirst Platform IBM MobileFirst Protect MaaS360 IBM Security AppScan Arxan Application Protection for IBM Solutions IBM QRadar Security Intelligence Platform IBM Security Trusteer IBM Mobile Security Services
  • 7. 7© 2015 IBM Corporation Protecting devices Every three minutes, a mobile device is wiped Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices 46% say their smartphone is something they couldn’t live without Source: “6 facts about Americans and their smartphones” by Pew Research Center, April 2015 87% By 2017, mobile devices will make up of Internet-enabled technology total sales Source: Lander Blog, “Five Online Marketing Trends for 2014, April 2014 Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014 87% have their smartphone at their side, day and night 78% spend over 2 hours a day using their smartphones 68% consider their smartphone to be a personal device Millennials and their smartphones…
  • 8. 8© 2015 IBM Corporation How do you protect your devices?  Identify devices at risk pre/post deployment?  Ensure devices accessing the network are encrypted?  Mitigate risks of lost and compromised devices?  Identify and respond to any device accessing your corporate data?  Deploy and manage a multi-OS environment with BYOD?  Remotely provision policies and restrictions?
  • 9. 9© 2015 IBM Corporation Deploy, manage and secure devices while mitigating the risks of lost and compromised devices Rapidly deploy devices Streamline the device provisioning, configuration and enrollment process for enterprise use over the air Centrally manage devices Embrace BYOD, corporate, and shared device with centralized policy and control from a single console Proactively secure devices Implement dynamic policies and compliance rules to continuously monitor devices and take automated action
  • 10. 10© 2015 IBM Corporation Large manufacturer deploys successful BYOD program with IBM MobileFirst Protect Client securely enabled mobility from the corporate office worker to the field service representative to better serve customers while keeping sensitive data secure.
  • 11. 11© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Securing content and collaboration “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014 59% allow employees to share or collaborate on documents if the company provides the mobile device 64% "73 Astonishing E-Mail Marketing Statistics You Need to Know", Mark the Marketer, February 2014 of decision-makers read their e-mail via mobile devices 60% of employees access content from outside the office “Productivity Anywhere, Anytime: Mobilize Your Business”, Box
  • 12. 12© 2015 IBM Corporation How do you secure content and collaboration? • Separate enterprise and personal data? • Prevent data leakage? • Provide secure access to sensitive data • Enforce compliance with security policies?
  • 13. 13© 2015 IBM Corporation Separate enterprise and personal data enforcing compliance with security policies Enable the secure web Provide access to intranet sites and web apps, URL filtering, and restrict cookies, downloads, copy / paste and print features Separate work email Contain email text and attachments to prevent data leakage, enforce authentication, copy / paste and forwarding restrictions Collaborate on content Ensure the availability of files from repositories with authentication, DLP controls, secure edit and sync, and selective wipe
  • 14. 14© 2015 IBM Corporation A retail store chain uses IBM MobileFirst Protect for faster service to its customers Client empowered in-store customer service representatives with shared smart devices to securely view inventory and merchandise information while on the store floor.
  • 15. 15© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Safeguarding applications and data 2.2 Kaspersky Lab “IT Threat Evolution Report for Q1 of 2015” billion malicious attacks on computers and mobile devices were blocked during Q1 2015 Gartner Press Release, May 2014 of all mobile security breaches are through apps75%overall mobile app usage grew in 201476% Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015 On average, a company tests less than half of the mobile apps they build and… never test apps to ensure they are secure33% Ponemon The State of Mobile Application Insecurity, February 2015
  • 16. 16© 2015 IBM Corporation How can you safeguard applications and data? • Develop secure mobile apps and assess the security of existing apps • Secure apps against reverse engineering and runtime attacks • Prevent deployment of risky mobile apps • Protect app data at rest and in motion • Distribute and control public and enterprise apps
  • 17. 17© 2015 IBM Corporation Build, test and secure mobile apps before distributing to end users Safely distribute apps Deploy custom enterprise app catalogs; blacklist, whitelist and require apps; administer app volume purchase programs Test app security Identify vulnerabilities in development and pre-deployment; isolate data leakage risks; ensure proper use of cryptography Protect apps Harden mobile apps to defend against reverse engineering; prevent repacking of apps; protect apps from mobile malware Secure app data Protect enterprise apps with authentication, tunneling, copy / paste restrictions and prevent access from compromised devices
  • 18. 18© 2015 IBM Corporation A hospital uses IBM Mobile Security to build a secure and protected patient care app Doctors, nurses, and non-hospital employees share timely patient information and test results on multiple devices to manage care while protecting sensitive information
  • 19. 19© 2015 IBM Corporation Manage access and fraud “The CyberVor gang amassed over 4.5billionrecords, mostly consisting of stolen credentials. To get such an impressive number of credentials, the CyberVors robbed over 420,000 web and FTP sites.” Hold Security $6.53 millionaverage cost of a U.S. data breach 2015 Cost of Data Breach Study, Ponemon Institute 95% of financial services incidents involve harvesting credentials stolen from customer devices 2015 Verizon Data Breech Report Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices “The CyberVor gang amassed over 4.5 billion records, mostly consisting of stolen credentials. To get such an impressive number of credentials, the CyberVors robbed over 420,000 web and FTP sites.” Hold Security $6.53 million average cost of a U.S. data breach 2015 Cost of Data Breach Study, Ponemon Institute 95% of financial services incidents involve harvesting credentials stolen from customer devices 2015 Verizon Data Breech Report
  • 20. 20© 2015 IBM Corporation How can you manage access and fraud?  How do you deliver mobile security capabilities in a consistent manner to address: - Web services / APIs - Traditional web access  How do you maintain mobility authentication ease-of-use expectations?  Can you ensure that security features are not being sacrificed as the pace of mobile development and deployment accelerates?  Can you prevent access from high risk or compromised mobile devices?
  • 21. 21© 2015 IBM Corporation Prevent unauthorized access and transactions by mobile users Adaptive access polices Dynamic and adaptive access policies provide risk and context aware policy enforcement while maintaining ease-of-use expectations Consolidated enforcement point A single point of secure access control and authentication for APIs and mobile apps enabling mobile single-sign-on Integrated device risk management Manage risk from rooted / jailbroken devices and from mobile malware integrated into access control polices and BYOD content management
  • 22. 22© 2015 IBM Corporation Company and independent agents access policy information in corporate offices or field, access policies dynamically change based on risk factors to ensure confidentiality and compliance An insurance company uses IBM Security Access Manager and Mobile Threat Management to keep customer data safe
  • 23. 23© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Extend security intelligence Annual Threat Report on Advanced Targeted Attacks, Mandiant Attackers spend an estimated 243 days on a victim’s network before being discovered Annual U.S. cost of a cyber-crime is $11.56 million per organization Cyber-Crime Costs Continue to Rise: Study, eWeek 63%of victims were made aware of breaches by an external organization Annual Threat Report on Advanced Targeted Attacks, Mandiant
  • 24. 24© 2015 IBM Corporation How can you extend security intelligence?  Increasingly sophisticated mobile attack methods  BYOD resulting in disappearing perimeters  Accelerating mobile security breaches  Infrastructure changing to support mobile  Too many products from multiple vendors; costly to configure and manage  Inadequate and ineffective tools  Struggling security teams  Mobile providing additional data sources with limited manpower and skills to manage it all  Managing and monitoring increasing compliance demands
  • 25. 25© 2015 IBM Corporation Gaining insights across the entire security event timeline Prioritize Events Quickly analyze very large volumes of collected data (events and logs) to get to a manageably small number of true incidents to be further analyzed Identify Threats Detect configuration errors and other deviations from the norm in order to gain awareness of vulnerabilities and assess exposures Take Corrective Action Dramatically reduce the time to remediation and increase the thoroughness of that remediation
  • 26. 26© 2015 IBM Corporation An international energy company parses billions of events per day to find those that should be investigated An international energy firm analyzes 2 billion events per day to find 20-25potential offenses to investigate
  • 27. 27© 2015 IBM Corporation Summary  Enterprise mobility management is needed and necessary  MDM is a good place to start but additional security required  Need to account for device risk  Must build secure mobile apps and must secure apps “in the wild”  Identity and access security must be adaptive – contextually aware Think of mobile security more holistically • Broader than MDM • Think… device, content, application, and access • More than a collection of point products • Must scale to address enterprise requirements
  • 28. 28© 2015 IBM Corporation Learn more about IBM Security V2015-11-23 countries where IBM delivers managed security services industry analyst reports rank IBM Security as a LEADER enterprise security vendor in total revenue clients protected including… 130+ 25 No. 1 12K+ 90% of the Fortune 100 companies Join IBM X-Force Exchange xforce.ibmcloud.com Visit our website ibm.com/security Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 29. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security
  • 30. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. Legal notices and disclaimers
  • 31. 31© 2015 IBM Corporation IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants Enterprise Mobility Management Suites June 2015 Client Management Tools May 2014 Managed Mobility Services July 2014 Mobile Application Development Platforms August 2015 Application Security Testing August 2015 Security Information and Event Management July 2015 Enterprise Content Management September 2014 Identity, Governance, Access August 2014
  • 32. 32© 2015 IBM Corporation Securely manage the diversity of endpoints IBM BigFix and IBM MobileFirst Protect Any device  Identify and respond to any device accessing your corporate data—regardless of what type it is or whether it’s personal or corporate-owned Any data  Protect corporate and sensitive apps, content and transactions in a secure container, whether in motion or at rest, preventing costly data loss scenarios Any location  Manage and secure every unique device—whether it’s on or off your corporate network—anywhere on the planet Any time  Get real-time visibility and control of every device on your network; find and fix problems in minutes—before they become major disruptions Consolidated view of managed endpoints
  • 33. 33© 2015 IBM Corporation Leading expertise to help optimize your security program Deploy Optimize Build Plan Design  Identify capability gaps, plan and deploy a robust strategy and roadmap to close them  Gain insight to prioritize security investments  Deploy intelligence-driven security capabilities  Optimize your ability to react to and contain events, while reducing impact SOC Transformation Build next generation security operations Security Maturity Assess and transform your security posture Metrics Technology Governance Process Organization IBM Security Strategy, Intelligence and Operations Consulting Services

Notas do Editor

  1. Mobility has forever transformed the way we work, communicate and socialize. Originating as a consumer-centric phenomena, mobility benefits have compelled organizations to rapidly adopt it as a way to boost employee productivity and customer engagement. Everywhere you look there are proof points and stats that point to the explosive growth in mobility. 1. The number of smartphone users worldwide will surpass 2 billion in 2016, according to new figures from eMarketer - - http://www.emarketer.com/Article/2-Billion-Consumers-Worldwide-Smartphones-by-2016/1011694#sthash.qRMTl192.dpuf 2. "By 2017, mobile apps will be downloaded more than 268 billion times" -- attribution is Garnter -http://www.gartner.com/newsroom/id/2654115
  2. 3. "There are 387 new threats every minute, or more than 6 every second." -- McAfee "Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015." http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf 4. Update Arxan data regarding mobile apps - source: Source: State of Security in the App Economy - “Apps Under Attack” (Dec 2014) - 97% of top paid Android apps have been hacked - 87% of top paid iOS apps have been hacked - 80% of the most popular free Android apps have been hacked 75% of the most popular free iOS apps have been hacked https://www.arxan.com/wp-content/uploads/assets1/pdf/State_of_Mobile_App_Security_2014_final.pdf
  3. At IBM we spend time thinking about a holistic solution to this problem. We think it needs to include the 4 key imperatives of enterprise mobility: the device itself, the enterprise content on it and the collaboration with others, the applications & data and managing device access and fraud. We surveyed hundreds of enterprises late last year about their mobile security journey. We concluded they are half way there: addressing the device and content layers, often with the deployment of enterprise mobility management suites, and starting to look at application security and managing access and fraud. Regardless of where you are in your own journey, we think you should consider the full roadmap and plan accordingly. Protect Devices Lost devices are the top security concern for 57% of organizations 60% use passcodes for device security; 71% can remote-wipe devices Secure Content and Collaboration Content theft / leakages are the top concern for 56% of organizations 60% use secure containers for data security; 40% restrict sharing of content Safeguard Applications and Data Application vulnerabilities are the top concern for 52% of organizations 41% use vulnerability scanners; only 23% have tamper-proofing capabilities Manage Access and Fraud 32% of organizations are concerned about fraudulent transactions 30% use risk scoring for transactions; only 18% can detect malware / jailbreaks Source: 2014 Information Security Media Group Survey, sponsored by IBM, “The State of Mobile Security Maturity”
  4. DONE As a technology leader, IBM Mobile Security has developed a Mobile Security framework with a dynamic approach to delivering a comprehensive mobile security strategy. It is a holistic approach to securing the four imperatives of enterprise mobility: the device, the enterprise content and data stored on it, the mobile applications used for employee productivity and the access and fraud concerns inherent with the devices. Underlying this, is an additional layer of protection and visibility through IBM’s security intelligence. Only by addressing all four imperatives can a company truly deploy a comprehensive mobile strategy and protect the assets and reputation of the enterprise. PROTECT DEVICES - Solutions to deploy and manage a diverse set of mobile devices and roaming devices from corporate owned assets to Bring Your Own Device (BYOD). SECURE CONTENT & COLLABORATION - Solutions to help secure file and document sharing across devices and SharePoint. SAFEGUARD APPLICATIONS & DATA – Solutions to develop applications with security by design. Protect enterprise data in both the applications you build and the applications you buy. MANAGE ACCESS & FRAUD – Solutions to help identify users and protect mobile sessions with customers, business partners, and temporary workers that are not part of your enterprise mobile management framework. EXTEND SECURITY INTELLIGENCE - A unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management.
  5. DONE IBM Mobile Security provides the most complete approach to mobile security allowing customers to implement a mobile security strategy that addresses devices, data, applications and users. These seamless solutions connect to your existing environment allowing you to implement any or all of the portfolio as your needs require. Designed to deliver an exceptional experience, these highly scalable security solutions, along with a unique threat intelligence platform, fuses context and risk awareness to maximize mobility management and security effectiveness.
  6. DONE Let’s start with our first imperative, Protect Devices….. Every 3 minutes, a device is wiped 87% of millennials always have their smartphone at their side, day and night 78% of millennials spend over 2 hours a day using their smartphones 68% of millennials consider their smartphone to be a personal device Source: Heidi Cohen December 2014 article, “55 US Mobile Facts Every Marketer Needs For 2015” http://heidicohen.com/2015-mobile-marketing/ According to a Pew Research Center report, “46% of smartphone owners say their smartphone is something they couldn't live without.” Source: http://www.pewresearch.org/fact-tank/2015/04/01/6-facts-about-americans-and-their-smartphones/ "By 2017, mobile devices will make up 87 percent of the total sales of Internet-enabled technology" Source: http://blog.landerapp.com/five-online-marketing-trends-for-2014/
  7. Speaker notes Neil?
  8. NEIL AND JIMMY TO PROVIDE SPEAKER NOTES RAPIDLY DEPLOY DEVICES – CENTRALLY MANAGE DEVICES – PROACTIVELY SECURE DEVICES -
  9. Speaker notes neil An large manufacturer deploys a BYOD program with IBM MobileFirst Protect to enable mobility from the corporate office worker to the field service representative to better serve customers while keeping sensitive data secure.
  10. DONE Next we look at our 2nd imperative, Secure Content and Collaboration 64% of decision-makers read their e-mail via mobile devices." "48% of e-mails are opened on mobile devices." Source: Mark The Marketer, https://markthemarketer.wordpress.com/2014/02/18/73-astonishing-e-mail-marketing-statistics-you-need-to-know - 59% of respondents say they allow employees to share or collaborate on documents if the company provides the mobile device Source: “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014 http://img.en25.com/Web/IntraLinks/%7B6988b757-8c9f-4d09-9dd6-da59f4083f1f%7D_Intralinks_Ponemon_Research_Report_Q4_2014%5B1%5D.pdf
  11. Speajer notes neil…Box content?
  12. Speaker notes neil, box content SEPARATE WORK EMAIL - ENABLE THE SECURE WEB - COLLABORATE ON CONTENT -
  13. NEIL AND JIMMY TO PROVIDE SPEAKER NOTES – what else can we add? Can we name the company? Any quantifiable benefits we can share? A retail store chain uses IBM MobileFirst Protect to empower in-store customer service representatives with shared smart devices to securely view inventory & merchandise information while on the store floor.
  14. DONE At this point we have talked about the first two pillars which are focused on protecting the device and securing the content and collaboration. Now we look into applications and data and what needs to be done to safeguard them. In 2014, IBM sponsored a study with the Ponemon Group “The State of Mobile Application Insecurity”. In this study we found that while companies are rapidly developing and deploying mobile applications, very few of them are taking steps to make sure that these applications are secure. There are 387 new threats every minute, or more than 6 every second." -- McAfee "Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015.“ Source: McAfee Labs Threats Report, February 2015 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf Through 2017, 75 percent of all mobile security breaches will be through apps, not through deep technical attacks on the OS, according to Gartner" Source: Gartner Press Release, May 2014 http://www.gartner.com/newsroom/id/2753017 "Overall mobile app usage grew by 76% in 2014 according to Flurry Analytics" Source: Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015 http://flurrymobile.tumblr.com/post/115194992530/shopping-productivity-and-messaging-give-mobile#.VM1WAWR4qPL
  15. Speaker notes – AppScan Speaker notes – ARXAN Speaker notes – MobileFirst Protect
  16. Requested from Neil J, Neil F and Jimmy T on 6/24 TEST APP SECURITY – PROTECT APPS – SECURE APP DATA – SAFELY DISTRIBUTE APPS –
  17. 95% OF THESE INCIDENTS INVOLVE HARVESTING CREDENTIALS STOLEN FROM CUSTOMER DEVICES, THEN LOGGING INTO WEB APPLICATIONS WITH THEM. Page 42 of Verizon Data Breech Report. $3.79 million Average total cost per data breach – Ponemon Institute Cost of Data Breach Study.“
  18. Not mobile specific data…..can we find some…”extending” The only beneficiaries besides successful hackers are security sellers. Need only think about the last holiday shopping season – with Target and Neiman Marcus and Michaels Match-up of above stats to sources: 243 days on a victim's network – https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks 32 days on average to resolve a cyber-crime - ( http://www.eweek.com/security/cyber-crime-costs-continue-to-rise-study.html ) Annual cost of Cyber Crime - $11.56M - ( http://www.eweek.com/security/cyber-crime-costs-continue-to-rise-study.html ) 38% of targets were attacked again - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks 63% of victims made aware of breaches by an external organization - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks
  19. The QRadar Security Intelligence Platform helps businesses gain visibility over their full security posture and across the entire security event timeline. The positioning of the main solutions shown here is a general positioning. Vulnerability Manager and Risk Manager deliver a large part of their value in the “pre-exploit” phase. They are focused on detecting configuration errors and other deviations from the norm, and attaining awareness of vulnerabilities and assessing exposures. Log Manager and SIEM deliver a large part of their value at the point where exploits must be detected and on into the remediation phase. The focus is on very quickly taking very large volumes of collected data (events and logs) and analyzing them to get to a manageably small number of true incidents to be further analyzed. Finally, Incident Forensics offers a great deal of its value in helping dramatically reduce the time to remediation and to increase the thoroughness of that remediation. ADDITIONAL NOTES No matter how many QRadar products are leveraged, or how many appliances constitute a client deployment, all capabilities are leveraged through a single console. The associated benefit is that there is a common interface delivering value in areas such as speed of operation, ease of adoption, transference of skills, and a universal learning curve. Designed from the beginning to integrate Log Management, SIEM, and Risk Management into one solution, the QRadar Security Intelligence platform delivers massive log management scale without any compromise on SIEM “Intelligence.” As indicated on the slide, the console integrates many useful data points provided by the different products. This view on the screen provides insights into what the attack was, who was responsible, what the targets were, and provides evidence and accompanying information and data that will help determine the right next steps to take. In summary, the client is made aware of the incident (that previously would have been hidden in a barrage of data). The client is told what its priority is and is given the information necessary to respond appropriately. And, the integrated console is robust. Do you need to do some searching? It is in there. Do you need to write some additional filter rules? It is in there. What about reporting? It is in there. It is a very comprehensive set of tools, and a “single pane of glass.” Also, if a client adds a new QRadar product into the mix, a tab appears for the product. It is visually and programmatically integrated into the Security Intelligence solution for the client.
  20. Client example: An international energy company reduces billions of events per day to find those that should be investigated Optimize threat analysis - An international energy firm analyzes 2 billion events per day to find 20-25 potential offenses to investigate Business challenge Reducing huge number of events to find the ones that need to be investigated Automating the process of analyzing security data Solutions (QRadar SIEM, QFlow, Risk Manager) Combined analysis of historical data with real-time alerts to gain a ‘big picture’ view and uncover patterns of unusual activity humans miss and immediately block suspected traffic
  21. IBM achieved the highest  enterprise security revenue of all vendors in 2014, according to Technology Business Research group’s Enterprise Security Market Forecast 2014-2019.   Note: Actual number of countries where IBM delivers managed security services is 134 as of Nov. 2015 90% of the Fortune 100 companies (based on 2014 Fortune 500 rankings) Source: 2015 MI IBM Security Heatmap
  22. Mandatory legal notices and disclaimers slide for external presentations
  23. <Presenter: Marketing team to update slide as MQs are released> We don’t just talk the talk. IBM is the only vendor with a leader position in 8 Gartner mobile magic quadrants.
  24. <Presenter: Slide to be used for BigFix discussions if needed> The broadest OS and device set in the industry from servers, PCs, Macs, tablets, smartphones, embedded and hardened devices, POS, and soon IoT
  25. Today’s rapidly evolving threat landscape demands smarter and more responsive managed security services. IBM Managed Security Services offer the industry-leading tools, technology and expertise to secure your information assets 24/7/365, often at a fraction of the cost of in-house security resources. Improve security IBM maintains the world's largest threat and vulnerability database Reduce cost Save up to 55% on information security management Lower risk Reliable protection with guaranteed service level agreements Security operations consulting from IBM provides specialists to help you assess and refine your strategy and then work with you to design a SOC with end-to-end threat management capabilities. Security operations consulting from IBM helps you establish a SOC designed to deliver a single view of security threats for real-time decision making. With these capabilities, you can: Optimize your ability to react to and contain cyber security events Reduce financial and operational impact to your business Develop a more proactive security posture