R i i E t M bilit

Re-imagine
R
i
i Enterprise
E t
i Mobility
M bilit
and Security in the Era of Cloud
Brendan Hannigan
General Manager, IBM Security Systems
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Leverage
Cloud
as a growth engine for
business
91
%
net new
software
Of
in 2014 is built for cloud delivery
2
Exploit
Mobile
to build customer and
employee engagement
84
%
Of
CIOs
rate mobility solutions as a
critical area for investment to
get closer to customers
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Business
Process
as a Service
Software
as a Service
Platform
as a Service
Infrastructure
as a Service
IBM Cloud Solutions
3
Smarter
S
t
Commerce
Smarter
S
t
Workforce
Big Data &
y
Analytics
Watson
Solutions
Smarter
Cities
Software
Solutions
BluemixTM
On Premises Cloud
Infrastructure
GBS Cloud
Business
Solutions
Cloud Managed
Services
Infrastructure
Services
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Build
Protect
Engage
Transform
IBM Mobile Capabilities
‐ Mobile App
Development
Platform
‐ Cloud Services
‐ Development and
Integration Services
4
‐ Enterprise Mobility
Management
Software and
S i
Services
‐ Mobile Analytics
Software
‐ Strategy and
Design Services
‐ Strategy and
Design Services
‐ Infrastructure
Consulting
Services
© 2014 IBM Corporation
Yesterday’s security
does not work
5
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Sophisticated attackers break through safeguards every day
2011
Year of the breach
2012
40% increase
2013
500,000,000+ records breached
Attack types
SQL
iinjection
j ti
61
%
6
Spear
phishing
hi hi
DDoS
Third-party
software
ft
of organizations say
data theft and cybercrime
are their greatest threats
IBM X-Force Threat Intelligence Quarterly – 1Q
2014, circle size estimates relative cost to business
Physical
access
Malware
XSS
Watering Undisclosed
h l
hole
cost
$3.5M+ average
of a data breach
2012 IBM Global Reputational Risk & IT Study
2014 Cost of Data Breach, Ponemon Institute © 2014 IBM Corporation
85
45
security tools from
vendors
IBM client example
7
© 2014 IBM Corporation
Cloud and mobile:
risk or opportunity?
8
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Cloud and mobile raise security concerns
70
%
of security executives have
cloud and mobile concerns
Top 3: Data, access, and auditing
2013 IBM CISO Survey
9
614
%
Mobile malware growth
in just one year
2012-2013 Juniper Mobile Threat Report
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
1
Cloud is an opportunity for enhanced security
IaaS
Maintain
cloud visibility
and control
10
PaaS
Leverage
crowd sourced
threat intelligence
SaaS
Use secure cloud
infrastructure
and services
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Employ cloud to improve security with IBM solutions
IaaS
SaaS
Maintain cloud
visibility and control
Leverage crowd sourced
threat intelligence
Use secure cloud
infrastructure and services
A global electronics firm helps
protect access to cloud-based
applications for
An international bank reduced
phishing attacks by
Streamlined number of user
accounts with cloud-delivered
identity and access management
for
10K
11
PaaS
90%
8.5M
employees
and phone fraud
to almost $0
automobile customers
and employees
IBM Security Access Manager
IBM Trusteer Fraud Protection
IBM Lighthouse Gateway
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
2
Build security into mobile deployments from day one
Personal
Enterprise Applications
and Cloud Services
Enterprise
DATA
Security Intelligence
Transaction Security
Application Security
Content Security
Device Security
Identity, Fraud,
and Data Protection
Device Security
Content Security
Application Security
Transaction Security
IBM Security Solutions
IBM
MaaS360
12
IBM MobileFirst Platform
(includes Worklight)
IBM Security
AppScan
IBM
Tealeaf
IBM
Trusteer
IBM Security
Access Manager
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Unlock mobile value with new security solutions
Personal
Enterprise Applications
and Cloud Services
Enterprise
DATA
Security Intelligence
Transaction Security
Application Security
Content Security
Device Security
Identity, Fraud,
and Data Protection
Discovered and enrolled
devices in the first
36,000
36 000
minutes with ability
60 to wipe the device if lost
Chemical company
13
70 000+
70,000
<500
users migrated
in the first month
Help desk
calls (< .5%)
IBM Corporation
© 2014 IBM Corporation
Sophisticated Attackers:
t diti
traditional
l defense
d f
or a
big data solution?
14
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
For sophisticated attacks, traditional defenses are not enough
Easy
Users
U
Customer
Accounts
15
Easy
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Security is a big data and analytics problem
Traditional Security
Operations and
Technology
Logs
Events
Configuration
information
System
audit trails
Business
process data
16
Identity
context
Network flows
and anomalies
External
th t feeds
threat
f d
Big Data
Analytics
Alerts
Malware
information
E-mail and
social activity
Full packet and
DNS captures
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
3
Stop advanced threats with security intelligence
Detect advanced threats
with security intelligence
Protect against fraud
and targeted attacks
Deploy integrated
security
17
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Threat Protection System: Integrated advanced threat defense
Endpoint Protection
Network Protection
Security Intelligence
Incident Forensics
Emergency
Response Services
XGS
Open
Integrations
18
Global Threat
Intelligence
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Helping clients stop advanced threats
An International
Energy Firm
Analyzed
2B+
events per day to find
99.9%+ with 0
20-25
reported breaches
in 3 yyears
potential offenses
to investigate
19
An International
Commodities Exchange
Maintained system
uptimes of
A Major
Health Care Provider
Monitors
25K+ endpoints
d i t
and blocked
200+ high risk infections
in the first 6 months
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Leverage
g intelligence
g
to help
pp
prevent fraud
Comprehensive solution built upon real-time intelligence and adaptable protection
Prevent “Root Cause”
of Fraud
Reduce
Operational Impact
Advanced
Fraud
Prevention
Improve Your
Customer Experience
20
Utilize Real-time
Intelligence Service
© 2014 IBM Corporation
IBM Security Solutions
21
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
IBM Security Portfolio
Consulting and Managed Services
Integrated Security Technologies
Security Intelligence and Operations
Security Intelligence and Analytics
Strategy,
Risk and Compliance
Identity and Access
Management
Services
Cloud and
Managed Services
Data and
Application
Security Services
Advanced
Fraud Protection
Cybersecurity
Assessment
and Response
Identity
and Access
Management
Data
Security
Application
Security
Infrastructure
and Threat
Protection
Advanced Threat and Security Research
Key Security Trends
Advanced
Threats
22
Cloud
Adoption
Mobile
Concerns
Compliance
Mandates
Skills
Shortage
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
23
1
Cloud is an opportunity for enhanced
i
security
2
Build security into mobile deployments
from day one
3
Stop advanced threats with security
intelligence
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
IBM has global breadth and scale in Cloud, Mobile and Security
Cloud
Mobile
Security
100+
3,000
,
+
1,700
,
SaaS offerings
mobile experts
security patents
1,500
18
25
clo d patents
cloud
M bil Fi t studios
MobileFirst
t di
global security
sec rit labs
40K+
8
15B+
mobile acquisitions
security events monitored
daily in 130 countries
cloud experts
24
© 2014 IBM Corporation
Visit us at…
New Cloud Services
and Apps in a Fraction
of the Time
IBM
Engagement
Zone
Made
With
IBM
Wednesday @ 10:15 am
Dolphin Hotel
Lobby
Booth 10
Expo
Dolphin, Southern 2
Join us at the IBM Cloud Café – Yacht and Beach Club
Schedule your own IBM-supported hackathon. Develop apps in the time it takes to order a latte.
25
#THINKTech
© 2014 IBM Corporation
Re-imagine Enterprise Mobility and Security in the Era of Cloud
Learn more
IBM Security
26
IBM MobileFirst
IBM Security Website
IBM MobileFirst Website
Watch our videos
Download the IBV Mobile Study
Read our blog
Sign up for a free Mobile
Agenda Workshop
@ibmsecurity
@ibmmobile
© 2014 IBM Corporation
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part off a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and
is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise
related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations
from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
f
References
in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates.
Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or
other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product,
27
© 2014 IBM Corporation
or service names may be trademarks or service marks of others.
`