SlideShare uma empresa Scribd logo
1 de 22
© 2013 IBM Corporation
IBM Security Systems
1© 2014 IBM Corporation
IBM mobile security
Intelligence, innovation and integration
IBM Security Systems
April 2014
© 2014 IBM Corporation
IBM Security Systems
2
As mobile grows, so do security threats
Mobile downloads
will increase to
108 billion
by 2017. 2
Mobile malware is
growing. Malicious
code is infecting more
than
11.6 million
mobile devices at any
given time. 3
In 2014 the number of
cell phones
(7.3 billion)
will exceed the
number of people on
the planet (7 billion).1
Mobile devices and
the apps we rely on
are under attack.
90%of the top
mobile apps have
been hacked. 4
© 2014 IBM Corporation
IBM Security Systems
3
Business must adapt and redefine security for mobile
2013 IBM CISCO
Assessment Findings
“Mobile security is the #1
technology investment
area.”
“76% of responders say
that the loss of a mobile
device with access to
corporate data could result
in a significant security
event.”
“Although many are planning
to develop an enterprise
strategy for mobile security
(39%), a significant number
have not done so yet (29%).”
© 2014 IBM Corporation
IBM Security Systems
4
Weak security can have significant financial impact on your brand
Costs
$52,646
per minute
Lasts
19.7 minutes
Minor event
chance of
happening
69%
Lasts about
2 hours
Costs
$38,069
per minute
Moderate event
chance of
happening*
37%
*The IBM 2013 Global Study on the Economic Impact of IT Risk Study.
Lasts about
7.5
hours
Costs
$30,995
per minute
Substantial event
chance of
happening*
23%
Most security breaches go undetected for eight months
© 2014 IBM Corporation
IBM Security Systems
5
Intelligence
Innovation
Integration
IBM® Security: Delivering intelligence, innovation and integration
across a comprehensive framework
IBM Security Framework
© 2014 IBM Corporation
IBM Security Systems
6
Mobile is changing the way we view the perimeter
Security is no longer controlled and enforced through the network perimeter
© 2014 IBM Corporation
IBM Security Systems
7
Device Security Content Security Application Security Transaction Security
• Manage the mobile
enterprise with BYOD,
BYOA, secure e-mail
and document sharing
• Secure file and
document sharing
across devices
and employees
including integration
with SharePoint
• Instrument applications
with security protection
by design
• Identify vulnerabilities
in new, existing or
purchased applications
• Secure mobile
transactions from
customers, partners
and suppliers
Security Intelligence
Correlate mobile security events with broader infrastructure including log management, anomaly detection and vulnerability
management for proactive threat avoidance
IT
Operations
Line-of-Business
Application Developer
Security
Specialist
Imperatives to securing the mobile enterprise
• Mitigate security risk across devices, applications, content and transactions
• Monitor enterprise security across all endpoints
• Manage mobility across the enterprise
CISO / CIO
Chief Information Security Officer
Chief Information Officer
© 2014 IBM Corporation
IBM Security Systems
8
IBM Security capabilities for the mobile enterprise
Device Security Content Security Application Security Transaction Security
• Solutions to manage a
diverse set of mobile
devices from corporate
owned assets to BYOD, all
from the cloud
• Solutions to help secure
file and document sharing
across devices and
SharePoint
• Solutions to develop
applications with security
by design
• Protect enterprise data in
both the applications you
build and the applications
you buy
• Solutions to help protect
mobile transactions with
customers, business
partners and temporary
workers that are not part of
your enterprise mobile
management framework
Security Intelligence
A unified architecture for integrating mobile security information and event management (SIEM), log management,
anomaly detection, and configuration and vulnerability management
Security Intelligence
Enterprise Applications
and Cloud Services
Identity, Fraud,
and Data Protection
Content Security
Application Security
Transaction Security
Device Security
DATA
Personal and
Consumer
Enterprise
© 2014 IBM Corporation
IBM Security Systems
9
Security Intelligence
Enterprise Applications
and Cloud Services
Identity, Fraud,
and Data Protection
Content Security
Application Security
Transaction Security
Device Security
DATA
Personal and
Consumer
Enterprise
Device Security Content Security Application Security Transaction Security
• Enroll, provision and configure
devices, settings and mobile
policy
• Fingerprint devices with a
unique and persistent mobile
device ID
• Remotely Locate, Lock and
Wipe lost or stolen devices
• Enforce device security
compliance: passcode,
encryption, jailbreak / root
detection
• Restrict copy, paste and share
• Integration with Connections,
SharePoint, Box, Google Drive,
Windows File Share
• Secure access to corporate
mail, calendar and contacts
• Secure access to corporate
intranet sites and network
Software Development Lifecycle
• Integrated Development
Environment
• iOS / Android Static Scanning
Application Protection
• App Wrapping or SDK Container
• Hardening & Tamper Resistance
IBM Business Partner (Arxan)
• Run-time Risk Detection
Malware, Jailbreak / Root, Device
ID, and Location
• Whitelist / Blacklist Applications
Access
• Mobile Access Management
• Identity Federation
• API Connectivity
Transactions
• Mobile Fraud Risk Detection
• Cross-channel Fraud Detection
• Browser Security / URL Filtering
• IP Velocity
Security Intelligence
Advanced threat detection with greater visibility
Security features capabilities for the mobile enterprise
© 2014 IBM Corporation
IBM Security Systems
10
Security solutions for the mobile enterprise
Enterprise Applications
and Cloud Services
Identity, Fraud,
and Data Protection
Device Security Content Security Application Security Transaction Security
IBM Security
AppScan
IBM Security
Access Manager
IBM Mobile Security Solutions
IBM Mobile Security Services
Security Intelligence
IBM Mobile First powered by…
IBM QRadar Security
Intelligence Platform
© 2014 IBM Corporation
IBM Security Systems
11
Fiberlink - MaaS360 Enterprise Mobility Management
 Challenge: Businesses need flexible and efficient ways to promote their mobile initiatives
while protecting data and privacy.
 Solution: Deliver comprehensive mobile management and security capabilities for users,
devices, apps, documents, email, web and networks.
Instantly deploy, manage and secure
devices, apps and content in the enterprise
 Key benefits
– Support corporate and employee-owned devices
– Promote dual persona with full containerization and BYOD
privacy
– Take automated action to ensure compliance with policies
– Control emails and attachments to prevent data leakage
– Distribute, secure and manage mobile applications
– Allow corporate documents on mobile devices securely
– Filter and control access to the web and corporate intranet sites
More Information
• Data Sheets
• Videos
• Case Studies
• White Papers
• Free 30-day Trial
© 2014 IBM Corporation
IBM Security Systems
12
Trusteer Mobile
 Challenge: Compromised devices and applications create fraud risk and an insecure
environment.
 Solution: Dynamically detect device risk factors and capture the underlying device.
Risk-aware mobile application and risk-based mobile
transaction assessment
More Information
 Key benefits
– Accurately detects device risk factors
– Allows or restricts sensitive mobile application functions based
on risks
– Mobile transaction risk can be correlated with cross-channel
risk factors to detect complex fraud schemes.
– Promotes comprehensive risk assessment and secure
application development
– Helps secure transactions from devices to the back office
– Integrates with IBM Worklight projects
• Website
• Whitepaper
• Trusteer Mobile SDK
• Trusteer Mobile App
© 2014 IBM Corporation
IBM Security Systems
13
IBM Security AppScan 9.0
 Challenge: Build in security during development of an application as well as assess the
security of existing applications.
 Solution: Mitigate application security risk and establish policies, scale testing and
prioritization and remediation of vulnerabilities.
Static, dynamic and interactive application
security testing
More Information
 Key benefits
– Promotes secure mobile application development
– Provides enhanced mobile application scanning
– Delivers comprehensive application security assessments to
measure and communicate progress to stakeholders
– Prioritizes application assets based on business impact and
highest risk
– Integrates with IBM Worklight projects
• Free Trial
• Client Brochure
• Analyst Report
• Solution Brief
© 2014 IBM Corporation
IBM Security Systems
14
IBM Worklight
 Challenge: Create an open, comprehensive, secure platform that manages HTML5, hybrid
and native mobile apps.
 Solution: Secure the application, reduce both development and maintenance costs,
improve time-to-market and enhance mobile app governance and security.
Build and manage mobile applications
with security
More Information
 Key benefits
– Support multiple mobile operating environments and
devices with the simplicity of a single, shared code base
– Connect and synchronize with enterprise data,
applications and cloud services
– Safeguard mobile security at the device, application and
network layer
– Govern your mobile app portfolio from a central
interface
• Website
• Case Study
• Datasheet
© 2014 IBM Corporation
IBM Security Systems
15
IBM Security Access Manager for Mobile 8.0
 Challenge: Provide secure access to mobile apps and reduce the risks of user access and
transactions from the mobile devices.
 Solution: Deliver mobile single sign-on and session management, enforce context-aware
access and improve identity assurance.
Safeguard mobile, cloud and social interactions
More Information
 Key benefits
– Protects the enterprise from high risk mobile devices by
integrating with Trusteer Mobile SDK
– Built-in support to seamlessly authenticate and authorize
users of Worklight developed mobile applications
– Enhances security intelligence and compliance through
integration with QRadar Security Intelligence
– Protects web and mobile applications against OWASP Top
10 web vulnerabilities with integrated XForce threat
protection
– Reduces TCO and time to value with an “all-in-one” access
appliance that allows flexible deployment of web and mobile
capabilities as needed
• Website
• Whitepaper
• Datasheet
• Demo Video
• Webinar
© 2014 IBM Corporation
IBM Security Systems
16
IBM QRadar Security Intelligence
 Challenge: Prioritize security events that require further investigation.
 Solution: Use event correlation to identify high probability incidents and eliminate false
positive results.
Automation, intelligence and integration provide visibility and
clarity to defeat advance threats and spot malicious insiders
More Information
 Key benefits
– Document user, application and data activity to satisfy
industry and governmental compliance reporting
requirements
– Protect private data and intellectual property by detecting
advanced persistent threats and other malicious activities
– Inspect network device configurations, visualize
connections and perform attack path simulations to
understand assets at risk
– Perform scheduled and real time asset vulnerability
scanning and prioritization to apply available patches and
stay ahead of possible attacks
• Executive Guide
• Platform Data Sheet
• Managing Risks
• PCI Compliance
© 2014 IBM Corporation
IBM Security Systems
17
IBM Security Services for Mobile
 Challenge: To address the latest transformation of virtualization, mobility, social business
and attack sophistication, you need to start by assessing your overall security and risk
management.
 Solution: IBM security services takes you from planning and design through
implementation, testing, monitoring and management of multi-vendor environments. Our
dedicated team of experts can help you better understand your requirements and risk
tolerance in order to securely adopt mobile technology.
Delivers the expertise, skills, and technology to help you
reduce the risk of going mobile
IBM Confidential
More Information
 Key benefits
– Assessment and Design: Analysis of network security
architecture, designing a framework that leverages the
cloud, optimizes cost, reduces risk and improves visibility
– Deployment and Integration: Working with clients to deploy
new security controls, both on premise and within the
cloud, while optimizing security policies
– Management and Monitoring: Consolidating hybrid security
to deliver threat monitoring and global intelligence.
• Cyber Security
Intelligence Index
• Website
• Resource Map
• IBM Mobile Security
Services
© 2014 IBM Corporation
IBM Security Systems
18
Large retail bank in Europe strengthens security for its mobile money
transfers and banking applications with Trusteer SDK
Business problem: A retail bank in the EU sought a secure
means to allow its users to perform the same functions they
performed online with their mobile devices.
Solution: Trusteer Mobile SDK helped protect the organizations'
existing mobile banking application by adding device risk analysis
and providing a persistent mobile device ID.
Benefits:
•Detects high risk access from compromised or vulnerable devices
•Generates a persistent mobile device ID for unique device
identification
Featured Security Offering: Trusteer Mobile SDK
$1 million
in fraud stopped in the
first week
$60 million
in fraud stopped in the
first year
© 2014 IBM Corporation
IBM Security Systems
19
IBM security experts apply custom tools and a hacker’s approach to
help protect the mobile enterprise
Business problem: An industry leader is providing a wide range of smart
devices to the world. The solution team was looking for a trusted partner to
assist them with securing their line of products.
Solution: IBM used both source code analysis and a hacker’s approach to
assess the security of the smart device and its modules. IBM experts
developed customized tools, a test methodology adapted to suit the client’s
needs and defined a threat model, re-usable on all their smart devices.
Benefits:
• increase integrity and availability of their devices,
• address stability issues, and most importantly,
• prevent hackers from gaining root access to the devices
Featured Security Offering: IBM Security Services – Smart and
Embedded Device Security
• Uncovered vulnerabilities
• Reduced development cost
• Improved brand image
• Protected intellectual property
Customer
Results:
© 2014 IBM Corporation
IBM Security Systems
20
• Own the security
agenda for innovation
• Embed security on
day one
• Leverage cloud,
mobile, social, and
big data to improve
security
• Develop a risk-aware
security strategy
• Deploy a systematic
approach to security
• Harness the knowledge
of professionals
• Use intelligence and
anomaly detection
across every domain
• Build an intelligence
vault around your
crown jewels
• Prepare your response
for the inevitable
IBM helps customers thwart attackers and seize new opportunities
Develop an integrated
approach to stay ahead
of the threat
3
Proactively implement
and optimize security
to innovate faster
2
Use insights
and analytics to build
smarter defenses
1
© 2014 IBM Corporation
IBM Security Systems
21
1
Learn more about IBM Security and MobileFirst :
Visit our website
Stay connected – read the latest blogs and visit
us at: Security Intelligence/Mobile Security
2
3
Find all the answers to your Mobile Security
Questions in one place. Bookmark our Mobile
Security Solutions Finder Tool
Three ways to get started with IBM Mobile Security
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without
warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these
materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the
applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all
countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities
or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of
the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and
outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack
others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access.
IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.

Mais conteúdo relacionado

Mais procurados

Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMMAGILLY
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the CrimeIBM Security
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?IBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Eventcalebbarlow
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 

Mais procurados (20)

Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Follow the Money, Follow the Crime
Follow the Money, Follow the CrimeFollow the Money, Follow the Crime
Follow the Money, Follow the Crime
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Rochester Security Event
Rochester Security EventRochester Security Event
Rochester Security Event
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Destaque

IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Sverige
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1Roger Snook
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Mostafa ElGhamrawy
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casingsDr. IRSHAD A
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Thales e-Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingSimeon Oriko
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?Parag Arjunwadkar
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingVikas Kottari
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityJohn Paul Prassanna
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology irshad narejo
 
Factors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattleFactors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattleDr. IRSHAD A
 
IGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity pptIGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity pptIrshad Tunio
 

Destaque (20)

IBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscapeIBM Smarter Business 2012 - IBM Security: Threat landscape
IBM Smarter Business 2012 - IBM Security: Threat landscape
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casings
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Payments Framework
Mobile Payments FrameworkMobile Payments Framework
Mobile Payments Framework
 
Testing & Quality Assurance
Testing & Quality AssuranceTesting & Quality Assurance
Testing & Quality Assurance
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Factors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattleFactors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattle
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
 
IGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity pptIGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity ppt
 

Semelhante a IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mobile Enterprise

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee Prolifics
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)gule mariam
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...IBM Security
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíMarketingArrowECS_CZ
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 

Semelhante a IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mobile Enterprise (20)

MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
IBM Maas360 with Watson
IBM Maas360 with WatsonIBM Maas360 with Watson
IBM Maas360 with Watson
 

Mais de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 

Mais de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mobile Enterprise

  • 1. © 2013 IBM Corporation IBM Security Systems 1© 2014 IBM Corporation IBM mobile security Intelligence, innovation and integration IBM Security Systems April 2014
  • 2. © 2014 IBM Corporation IBM Security Systems 2 As mobile grows, so do security threats Mobile downloads will increase to 108 billion by 2017. 2 Mobile malware is growing. Malicious code is infecting more than 11.6 million mobile devices at any given time. 3 In 2014 the number of cell phones (7.3 billion) will exceed the number of people on the planet (7 billion).1 Mobile devices and the apps we rely on are under attack. 90%of the top mobile apps have been hacked. 4
  • 3. © 2014 IBM Corporation IBM Security Systems 3 Business must adapt and redefine security for mobile 2013 IBM CISCO Assessment Findings “Mobile security is the #1 technology investment area.” “76% of responders say that the loss of a mobile device with access to corporate data could result in a significant security event.” “Although many are planning to develop an enterprise strategy for mobile security (39%), a significant number have not done so yet (29%).”
  • 4. © 2014 IBM Corporation IBM Security Systems 4 Weak security can have significant financial impact on your brand Costs $52,646 per minute Lasts 19.7 minutes Minor event chance of happening 69% Lasts about 2 hours Costs $38,069 per minute Moderate event chance of happening* 37% *The IBM 2013 Global Study on the Economic Impact of IT Risk Study. Lasts about 7.5 hours Costs $30,995 per minute Substantial event chance of happening* 23% Most security breaches go undetected for eight months
  • 5. © 2014 IBM Corporation IBM Security Systems 5 Intelligence Innovation Integration IBM® Security: Delivering intelligence, innovation and integration across a comprehensive framework IBM Security Framework
  • 6. © 2014 IBM Corporation IBM Security Systems 6 Mobile is changing the way we view the perimeter Security is no longer controlled and enforced through the network perimeter
  • 7. © 2014 IBM Corporation IBM Security Systems 7 Device Security Content Security Application Security Transaction Security • Manage the mobile enterprise with BYOD, BYOA, secure e-mail and document sharing • Secure file and document sharing across devices and employees including integration with SharePoint • Instrument applications with security protection by design • Identify vulnerabilities in new, existing or purchased applications • Secure mobile transactions from customers, partners and suppliers Security Intelligence Correlate mobile security events with broader infrastructure including log management, anomaly detection and vulnerability management for proactive threat avoidance IT Operations Line-of-Business Application Developer Security Specialist Imperatives to securing the mobile enterprise • Mitigate security risk across devices, applications, content and transactions • Monitor enterprise security across all endpoints • Manage mobility across the enterprise CISO / CIO Chief Information Security Officer Chief Information Officer
  • 8. © 2014 IBM Corporation IBM Security Systems 8 IBM Security capabilities for the mobile enterprise Device Security Content Security Application Security Transaction Security • Solutions to manage a diverse set of mobile devices from corporate owned assets to BYOD, all from the cloud • Solutions to help secure file and document sharing across devices and SharePoint • Solutions to develop applications with security by design • Protect enterprise data in both the applications you build and the applications you buy • Solutions to help protect mobile transactions with customers, business partners and temporary workers that are not part of your enterprise mobile management framework Security Intelligence A unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management Security Intelligence Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Content Security Application Security Transaction Security Device Security DATA Personal and Consumer Enterprise
  • 9. © 2014 IBM Corporation IBM Security Systems 9 Security Intelligence Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Content Security Application Security Transaction Security Device Security DATA Personal and Consumer Enterprise Device Security Content Security Application Security Transaction Security • Enroll, provision and configure devices, settings and mobile policy • Fingerprint devices with a unique and persistent mobile device ID • Remotely Locate, Lock and Wipe lost or stolen devices • Enforce device security compliance: passcode, encryption, jailbreak / root detection • Restrict copy, paste and share • Integration with Connections, SharePoint, Box, Google Drive, Windows File Share • Secure access to corporate mail, calendar and contacts • Secure access to corporate intranet sites and network Software Development Lifecycle • Integrated Development Environment • iOS / Android Static Scanning Application Protection • App Wrapping or SDK Container • Hardening & Tamper Resistance IBM Business Partner (Arxan) • Run-time Risk Detection Malware, Jailbreak / Root, Device ID, and Location • Whitelist / Blacklist Applications Access • Mobile Access Management • Identity Federation • API Connectivity Transactions • Mobile Fraud Risk Detection • Cross-channel Fraud Detection • Browser Security / URL Filtering • IP Velocity Security Intelligence Advanced threat detection with greater visibility Security features capabilities for the mobile enterprise
  • 10. © 2014 IBM Corporation IBM Security Systems 10 Security solutions for the mobile enterprise Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device Security Content Security Application Security Transaction Security IBM Security AppScan IBM Security Access Manager IBM Mobile Security Solutions IBM Mobile Security Services Security Intelligence IBM Mobile First powered by… IBM QRadar Security Intelligence Platform
  • 11. © 2014 IBM Corporation IBM Security Systems 11 Fiberlink - MaaS360 Enterprise Mobility Management  Challenge: Businesses need flexible and efficient ways to promote their mobile initiatives while protecting data and privacy.  Solution: Deliver comprehensive mobile management and security capabilities for users, devices, apps, documents, email, web and networks. Instantly deploy, manage and secure devices, apps and content in the enterprise  Key benefits – Support corporate and employee-owned devices – Promote dual persona with full containerization and BYOD privacy – Take automated action to ensure compliance with policies – Control emails and attachments to prevent data leakage – Distribute, secure and manage mobile applications – Allow corporate documents on mobile devices securely – Filter and control access to the web and corporate intranet sites More Information • Data Sheets • Videos • Case Studies • White Papers • Free 30-day Trial
  • 12. © 2014 IBM Corporation IBM Security Systems 12 Trusteer Mobile  Challenge: Compromised devices and applications create fraud risk and an insecure environment.  Solution: Dynamically detect device risk factors and capture the underlying device. Risk-aware mobile application and risk-based mobile transaction assessment More Information  Key benefits – Accurately detects device risk factors – Allows or restricts sensitive mobile application functions based on risks – Mobile transaction risk can be correlated with cross-channel risk factors to detect complex fraud schemes. – Promotes comprehensive risk assessment and secure application development – Helps secure transactions from devices to the back office – Integrates with IBM Worklight projects • Website • Whitepaper • Trusteer Mobile SDK • Trusteer Mobile App
  • 13. © 2014 IBM Corporation IBM Security Systems 13 IBM Security AppScan 9.0  Challenge: Build in security during development of an application as well as assess the security of existing applications.  Solution: Mitigate application security risk and establish policies, scale testing and prioritization and remediation of vulnerabilities. Static, dynamic and interactive application security testing More Information  Key benefits – Promotes secure mobile application development – Provides enhanced mobile application scanning – Delivers comprehensive application security assessments to measure and communicate progress to stakeholders – Prioritizes application assets based on business impact and highest risk – Integrates with IBM Worklight projects • Free Trial • Client Brochure • Analyst Report • Solution Brief
  • 14. © 2014 IBM Corporation IBM Security Systems 14 IBM Worklight  Challenge: Create an open, comprehensive, secure platform that manages HTML5, hybrid and native mobile apps.  Solution: Secure the application, reduce both development and maintenance costs, improve time-to-market and enhance mobile app governance and security. Build and manage mobile applications with security More Information  Key benefits – Support multiple mobile operating environments and devices with the simplicity of a single, shared code base – Connect and synchronize with enterprise data, applications and cloud services – Safeguard mobile security at the device, application and network layer – Govern your mobile app portfolio from a central interface • Website • Case Study • Datasheet
  • 15. © 2014 IBM Corporation IBM Security Systems 15 IBM Security Access Manager for Mobile 8.0  Challenge: Provide secure access to mobile apps and reduce the risks of user access and transactions from the mobile devices.  Solution: Deliver mobile single sign-on and session management, enforce context-aware access and improve identity assurance. Safeguard mobile, cloud and social interactions More Information  Key benefits – Protects the enterprise from high risk mobile devices by integrating with Trusteer Mobile SDK – Built-in support to seamlessly authenticate and authorize users of Worklight developed mobile applications – Enhances security intelligence and compliance through integration with QRadar Security Intelligence – Protects web and mobile applications against OWASP Top 10 web vulnerabilities with integrated XForce threat protection – Reduces TCO and time to value with an “all-in-one” access appliance that allows flexible deployment of web and mobile capabilities as needed • Website • Whitepaper • Datasheet • Demo Video • Webinar
  • 16. © 2014 IBM Corporation IBM Security Systems 16 IBM QRadar Security Intelligence  Challenge: Prioritize security events that require further investigation.  Solution: Use event correlation to identify high probability incidents and eliminate false positive results. Automation, intelligence and integration provide visibility and clarity to defeat advance threats and spot malicious insiders More Information  Key benefits – Document user, application and data activity to satisfy industry and governmental compliance reporting requirements – Protect private data and intellectual property by detecting advanced persistent threats and other malicious activities – Inspect network device configurations, visualize connections and perform attack path simulations to understand assets at risk – Perform scheduled and real time asset vulnerability scanning and prioritization to apply available patches and stay ahead of possible attacks • Executive Guide • Platform Data Sheet • Managing Risks • PCI Compliance
  • 17. © 2014 IBM Corporation IBM Security Systems 17 IBM Security Services for Mobile  Challenge: To address the latest transformation of virtualization, mobility, social business and attack sophistication, you need to start by assessing your overall security and risk management.  Solution: IBM security services takes you from planning and design through implementation, testing, monitoring and management of multi-vendor environments. Our dedicated team of experts can help you better understand your requirements and risk tolerance in order to securely adopt mobile technology. Delivers the expertise, skills, and technology to help you reduce the risk of going mobile IBM Confidential More Information  Key benefits – Assessment and Design: Analysis of network security architecture, designing a framework that leverages the cloud, optimizes cost, reduces risk and improves visibility – Deployment and Integration: Working with clients to deploy new security controls, both on premise and within the cloud, while optimizing security policies – Management and Monitoring: Consolidating hybrid security to deliver threat monitoring and global intelligence. • Cyber Security Intelligence Index • Website • Resource Map • IBM Mobile Security Services
  • 18. © 2014 IBM Corporation IBM Security Systems 18 Large retail bank in Europe strengthens security for its mobile money transfers and banking applications with Trusteer SDK Business problem: A retail bank in the EU sought a secure means to allow its users to perform the same functions they performed online with their mobile devices. Solution: Trusteer Mobile SDK helped protect the organizations' existing mobile banking application by adding device risk analysis and providing a persistent mobile device ID. Benefits: •Detects high risk access from compromised or vulnerable devices •Generates a persistent mobile device ID for unique device identification Featured Security Offering: Trusteer Mobile SDK $1 million in fraud stopped in the first week $60 million in fraud stopped in the first year
  • 19. © 2014 IBM Corporation IBM Security Systems 19 IBM security experts apply custom tools and a hacker’s approach to help protect the mobile enterprise Business problem: An industry leader is providing a wide range of smart devices to the world. The solution team was looking for a trusted partner to assist them with securing their line of products. Solution: IBM used both source code analysis and a hacker’s approach to assess the security of the smart device and its modules. IBM experts developed customized tools, a test methodology adapted to suit the client’s needs and defined a threat model, re-usable on all their smart devices. Benefits: • increase integrity and availability of their devices, • address stability issues, and most importantly, • prevent hackers from gaining root access to the devices Featured Security Offering: IBM Security Services – Smart and Embedded Device Security • Uncovered vulnerabilities • Reduced development cost • Improved brand image • Protected intellectual property Customer Results:
  • 20. © 2014 IBM Corporation IBM Security Systems 20 • Own the security agenda for innovation • Embed security on day one • Leverage cloud, mobile, social, and big data to improve security • Develop a risk-aware security strategy • Deploy a systematic approach to security • Harness the knowledge of professionals • Use intelligence and anomaly detection across every domain • Build an intelligence vault around your crown jewels • Prepare your response for the inevitable IBM helps customers thwart attackers and seize new opportunities Develop an integrated approach to stay ahead of the threat 3 Proactively implement and optimize security to innovate faster 2 Use insights and analytics to build smarter defenses 1
  • 21. © 2014 IBM Corporation IBM Security Systems 21 1 Learn more about IBM Security and MobileFirst : Visit our website Stay connected – read the latest blogs and visit us at: Security Intelligence/Mobile Security 2 3 Find all the answers to your Mobile Security Questions in one place. Bookmark our Mobile Security Solutions Finder Tool Three ways to get started with IBM Mobile Security
  • 22. www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Notas do Editor

  1. Welcome to this discussion of security in a mobile world. Both mobile technology and data security are major components of business today. The question is: where do the two converge in a way that benefits both the customer, and the business?Let’s take a deeper look at the rapidly evolving mobile technology space – and the security strategies that will be most effective in the future.Questions to consider asking the audience: Is mobile technology important to your business strategy? Is the security of your company and customer data important to your business strategy? Do you believe your mobile security strategy is good enough – or can it be improved?
  2. The number of mobile subscribers continues to grow at astonishing rates. In 2000, there were approximately 720 million subscribers around the world. In 2012, that number reached six billion.Let’s also consider these statistics: In 2014 the number of cell phones (7.3 billion) will exceed the number of people on the planet (7 billion).1 Mobile downloads will increase to108 billionby 2017. 2 Mobile malware is growing. Malicious code is infecting more than11.6 millionmobile devices at any given time. 3 Mobile devices and the apps we rely on are under attack. 90% of the top mobile apps have been hacked. 4While the proliferation of mobile devices provides great flexibility and agility for organizations, it also increases the complexity of device management and data protection. As mobile grows, so too does the security threat landscape.1. International Telecommunications Union – January 2013: http://www.siliconindia.com/magazine_articles/World_to_have_more_cell_phone_accounts_than_people_by_2014-DASD767476836.html2. Berg Insight Report – February 2013 : http://cloudtimes.org/2013/02/25/berg-insight-mobile-app-downloads-to-reach-108-billion-by-2017/3. InfoSec – January 2014 http://www.infosecurity-magazine.com/view/36686/mobile-malware-infects-millions-lte-spurs-growth/4. Axran Technologies - 2012 http://www.arxan.com/app-economy-under-attack-report-reveals-more-than-90-percent-of-the-top-100-mobile-apps-have-been-hacked/
  3. In order to gain a competitive advantage, business must embrace the opportunities afforded by mobile and cloud technology. However, security within these spaces is an all-consuming and all too legitimate concern. Business leaders must craft effective mobile security strategies that can be quickly and affordably implemented in order to reap the benefits of mobile business.Today’s Chief Information Security Officers (CISOs) are asking themselves, “How can we benefit from mobile and cloud technology – securely?” Risk and security officers are often placed in the role of public defender for corporations.  They are charged with proactively protecting the enterprise from a variety of cyber threats while the business continues to evolve. This broad responsibility becomes even more challenging when companies adopt new technology without a security strategy.IBM’s 2013 CISO Assessment interviews security leaders to get there perspective and priorities.  Businesses around the globe are embracing mobile and cloud technology at a rapid pace and yet 76% of respondents say that the loss of an employee owned mobile device with access to their corporate network could result in a significant security event.   Investment in new technology can be a tremendous asset to business growth and efficiency but the reality is that few companies are as prepared as they need to be.
  4. IBM offers integrated security intelligence and industry-leading experience enabled by the IBM Security Framework solution capabilities.These capabilities are delivered through a comprehensive and robust set of tools and best practices (including software and hardware) that are supported by the services needed to address:Intelligence: Through a common and intuitive view that combines deep analytics with real-time security intelligence.Innovation: Through a more proactive and trusted source of truth in order to stay ahead of emerging threats and risks.Integration: Through unifying existing tools and infrastructures with new forms of defense in order to reduce complexity and lower the cost of maintaining a strong security posture.Addressing these three key imperatives enables a more holistic, comprehensive perspective and can enhance your security maturity.
  5. In the past, private data, software and code could be reasonably protected behind a network perimeter of security. With the rise of mobile, that perimeter can no longer be the most important line of defense when it comes to security threats. Organizations must develop mobile security strategies that go beyond the perimeter of the enterprise and into the mobile sphere.
  6. The imperatives to securing a mobile enterprise within an organization are unique.Whether you’re the CISO trying to…Mitigate security risk across devices, applications, content and transactionsComprehensively understand enterprise security across all endpointsComprehensive enterprise mobility managementOr an IT Operations Manager required to…Secure the device so you can manage the entire mobile enterprise with BYOD, BYOA, secure e-mail and document sharingThen expand that security to securing the contentso you can secure the file and document sharing across devices and employees including integration with SharePointOr how about the Line-of-Business or Application Developer that’s trying to secure the app in order to…Instrument applications with security protection by designScan new and existing application for vulnerabilitiesAnd finally the Security Specialist trying to secure all the transactions, it’s imperative he …Secures mobile transactions from customers, partners and suppliersCorrelate mobile security events with broader infrastructure for proactive threat avoidanceIBM understands these unique and individual needs of your organization, and we’re here to help.
  7. IBM offers the capabilities that are most requested to address today’s mobile challenges: Device Security:Solutions to manage a diverse set of mobile devices from corporate owned assets to BYOD, all from the cloud.Content Security : Secure file and document sharing across devices and employees including integration with SharePoint.Application Security :Developer solutions to secure applications by design early in the development process. Protect enterprise data in both the applications being built and the applications bought. Transaction Security: Solutions to protect mobile transactions with customers, business partners and temporary workers that are not part of your enterprise mobile management framework. Security Intelligence:Provide a unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management.
  8. IBM Security feature capabilities for the mobile enterprise encompass a range of benefits.Protecting the Device: Enrolling, provisioning, configuring, monitoring, ability to locate the device, fingerprint access and remote wiping.Safeguarding Content:Secure file and document sharing across devices and employees including integration with SharePoint.Restricting copy, paste and share, and integration with SharePoint.Securing the Application: Developer solutions to secure applications by design early in the development process. Protect enterprise data in both the applications being built and the applications bought. App Wrapping or SDK, End-to-end Mobile Content Security, Run-time Risk Detection, iOS / Android Static Scanning, Integrated Development Environment, Experience Management, Tamper Proofing, Whitelist / Blacklist ApplicationsSafeguarding Transactions: Solutions to protect mobile transactions with customers, business partners, and temporary workers that are not part of your enterprise mobile management framework. Account Takeover Detection, Mobile Fraud Risk Detection, Cross-channel Risk Detection, Mobile Access Management, Identity Federation, Application Level VPN, Secure API Connectivity, Secure Browser / URL FilteringSECURITY INTELLIGENCE: Advanced threat detection with greater visibility.
  9. IBM mobile security is provided by a wide range of powerful solutions, including Maas360, Worklight, IBM Security AppScan, IBM Security Access Manager and Trusteer. Robust security intelligence can be achieved by deploying the IBM QRadar Security Intelligence Platform.
  10. Here is an overview of the typical business challenge, solution and benefits that Fiberlink address with MaaS 360. With Fiberlink, IBM offers a comprehensive mobility enterprise management solution which is proven, powerful, secure, seamless and simple – all of which help to deliver a low-cost, highly productive and secure environment.MaaS360 is an Enterprise Mobility Management platform that helps any size business, subsidiary or department to quickly and securely manage mobile devices. Fiberlink’s long time expertise and focus on delivering enterprise mobile computing solutions for over two decades translates to best practices that accelerate deployment, eliminate risk and simplify Mobile Enterprise Management. MaaS360 is the only solution in the market with the credentials to give customers confidence in the areas that matter most:   Simple and fast deployments with an exceptional customer experience for IT and employees Powerful management and security capabilities to address the full mobility lifecycle Flexible mobile application container options to separate work and personal data Seamless integration with existing enterprise systems such as email, directories, and certificate authorities The most trusted and proven approach to delivering Enterprise Mobility Management
  11. This chart provides an overview of the typical business challenge, solution and benefits from Trusteer. Trusteer’s Cybercrime Prevention Architecture is a differentiator in IBM’s technology foundation of mobile security. These solutions tackle online and mobile fraud both at the application and transaction level. The Mobile SDK and Mobile App offerings are built upon real-time intelligence and threat research.
  12. Application security is focused around the software development lifecycle and the steps (or stages) of developing software and applications. We have two basic approaches to application security for mobile. The first is essentially catching it as you're developing it. We call it, “static analysis” or “white box testing”. It’s going into the source code going into the coding process and picking up bad security habits in the development process and weeding them out before production. This is the most efficient way to secure code and to protect against his is the most efficient way to secure code to protect yourself against SQL injection and the many application risks that are out there if you code badly. The next approach is a dynamic post-production analysis capability also known as “black box” testing. Testing applications that are in production, penetration test it, is there a way of breaching it? Is there a way of compromising your security through this application? Key themes are that we’ve extended these capabilities to mobile Android and iOS applications. We help you test the security of these apps that you’ve developed for your consumers, partners, and employees to use. We’ve simplified the interface and have made sure that your ROI is even faster for you.
  13. IBM Worklight helps you extend your business to mobile devices. It is designed to provide an open, comprehensive platform to build, run and manage HTML5, hybrid and native mobile apps. IBM Worklight can help you reduce both app development and maintenance costs, improve time-to-market and enhance mobile app governance and security.IBM Worklight is comprised of five components:IBM Worklight Studio is designed to provide a comprehensive environment for advanced, rich, cross-platform mobile app development.IBM Worklight Server is mobile-optimized middleware that serves as a gateway between applications, back-end systems and cloud-based services.IBM Worklight Device Runtime Components offer runtime client application program interfaces (API) designed to enhance security, governance and usability.IBM Worklight Application Center enables you to set up an enterprise app store that manages the distribution of production-ready mobile apps. IBM Worklight Console is an administrative graphical user interface (GUI) for the server, adapters, applications and push services to help you manage, monitor and instrument mobile apps.
  14. Here we have an overview of the typical business challenge, solution and benefits that IBM Security Access Manager for Mobile delivers. IBM offers products and technologies that allow a robust Access Management. These capabilities promote access and entitlement management, single sign-on, and risk-based authentication. An example of this is if I take my mobile device from my normal geography to another part of the world, a second factor of authentication may be required to make sure that you truly are that person because we don't recognize the location you're in as being normal. So again, it’s a great example of intelligence built into access management. Our Identity Management capabilities enable user provisioning, role management, and now privileged identity management solutions; This allows you to monitor the actions of your most “trusted” users as they access your servers, databases, and IT infrastructure from a mobile device. IBM also offers a built in Policy-based Identity and Access Governance capabilities as well as the ability to link to IBM QRadar. Our Security Intelligence layer is a key differentiator for IBM’s Mobile Security Solutions.
  15. This is an overview of the typical business challenge, solution and benefits that IBM Qradar can deliver for mobile security. IBM QRadar Security Intelligence Platform products provide a unified architecture for integrating security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management. Our security intelligence solutions for mobile foster advanced threat detection, greater ease of use and lower total cost of ownership.
  16. IBM Security Services for Mobile are designed to reduce the risk of going mobile. The challenge today begins with a clear assessment of your organization’s overall security and risk management strategy. Once this assessment is made, IBM security services takes you from planning and design through implementation, testing, monitoring and management of multi-vendor environments. IBM experts can help you better understand your requirements and risk tolerance in order to securely adopt mobile technology. With these services in place, you have the opportunity to utilize the cloud while reducing overall risk and improving visibility. Costs can be minimized, security policies can be enhanced, and hybrid security solutions can be consolidated in order to deliver threat monitoring and global intelligence.
  17. IBM offers an intelligent, innovative and integrated security approach. All of the IBM security offerings are backed by an extensive business partner ecosystem which consists of industry-leading technology, sales and service partners.Our security capabilities are delivered through a comprehensive and robust set of tools and best practices (including software and hardware) that are supported by the services needed to address:Intelligence: Through a common and intuitive view that combines deep analytics with real-time security intelligence.Innovation: Our proactive and trusted source of truth enables us to stay ahead of emerging threats and risks.Integration: Through unifying existing tools and infrastructures with new forms of defense in order to reduce complexity and lower the cost of maintaining a strong security posture.