Re-imagine R i i Enterprise E t i Mobility M bilit and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems Re-imagine Enterprise Mobility and Security in the Era of Cloud Leverage Cloud as a growth engine for business 91 % net new software Of in 2014 is built for cloud delivery 2 Exploit Mobile to build customer and employee engagement 84 % Of CIOs rate mobility solutions as a critical area for investment to get closer to customers © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Business Process as a Service Software as a Service Platform as a Service Infrastructure as a Service IBM Cloud Solutions 3 Smarter S t Commerce Smarter S t Workforce Big Data & y Analytics Watson Solutions Smarter Cities Software Solutions BluemixTM On Premises Cloud Infrastructure GBS Cloud Business Solutions Cloud Managed Services Infrastructure Services © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Build Protect Engage Transform IBM Mobile Capabilities ‐ Mobile App Development Platform ‐ Cloud Services ‐ Development and Integration Services 4 ‐ Enterprise Mobility Management Software and S i Services ‐ Mobile Analytics Software ‐ Strategy and Design Services ‐ Strategy and Design Services ‐ Infrastructure Consulting Services © 2014 IBM Corporation Yesterday’s security does not work 5 © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Sophisticated attackers break through safeguards every day 2011 Year of the breach 2012 40% increase 2013 500,000,000+ records breached Attack types SQL iinjection j ti 61 % 6 Spear phishing hi hi DDoS Third-party software ft of organizations say data theft and cybercrime are their greatest threats IBM X-Force Threat Intelligence Quarterly – 1Q 2014, circle size estimates relative cost to business Physical access Malware XSS Watering Undisclosed h l hole cost $3.5M+ average of a data breach 2012 IBM Global Reputational Risk & IT Study 2014 Cost of Data Breach, Ponemon Institute © 2014 IBM Corporation 85 45 security tools from vendors IBM client example 7 © 2014 IBM Corporation Cloud and mobile: risk or opportunity? 8 © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Cloud and mobile raise security concerns 70 % of security executives have cloud and mobile concerns Top 3: Data, access, and auditing 2013 IBM CISO Survey 9 614 % Mobile malware growth in just one year 2012-2013 Juniper Mobile Threat Report © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud 1 Cloud is an opportunity for enhanced security IaaS Maintain cloud visibility and control 10 PaaS Leverage crowd sourced threat intelligence SaaS Use secure cloud infrastructure and services © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Employ cloud to improve security with IBM solutions IaaS SaaS Maintain cloud visibility and control Leverage crowd sourced threat intelligence Use secure cloud infrastructure and services A global electronics firm helps protect access to cloud-based applications for An international bank reduced phishing attacks by Streamlined number of user accounts with cloud-delivered identity and access management for 10K 11 PaaS 90% 8.5M employees and phone fraud to almost $0 automobile customers and employees IBM Security Access Manager IBM Trusteer Fraud Protection IBM Lighthouse Gateway © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud 2 Build security into mobile deployments from day one Personal Enterprise Applications and Cloud Services Enterprise DATA Security Intelligence Transaction Security Application Security Content Security Device Security Identity, Fraud, and Data Protection Device Security Content Security Application Security Transaction Security IBM Security Solutions IBM MaaS360 12 IBM MobileFirst Platform (includes Worklight) IBM Security AppScan IBM Tealeaf IBM Trusteer IBM Security Access Manager © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Unlock mobile value with new security solutions Personal Enterprise Applications and Cloud Services Enterprise DATA Security Intelligence Transaction Security Application Security Content Security Device Security Identity, Fraud, and Data Protection Discovered and enrolled devices in the first 36,000 36 000 minutes with ability 60 to wipe the device if lost Chemical company 13 70 000+ 70,000 <500 users migrated in the first month Help desk calls (< .5%) IBM Corporation © 2014 IBM Corporation Sophisticated Attackers: t diti traditional l defense d f or a big data solution? 14 © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud For sophisticated attacks, traditional defenses are not enough Easy Users U Customer Accounts 15 Easy © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Security is a big data and analytics problem Traditional Security Operations and Technology Logs Events Configuration information System audit trails Business process data 16 Identity context Network flows and anomalies External th t feeds threat f d Big Data Analytics Alerts Malware information E-mail and social activity Full packet and DNS captures © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud 3 Stop advanced threats with security intelligence Detect advanced threats with security intelligence Protect against fraud and targeted attacks Deploy integrated security 17 © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Threat Protection System: Integrated advanced threat defense Endpoint Protection Network Protection Security Intelligence Incident Forensics Emergency Response Services XGS Open Integrations 18 Global Threat Intelligence © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Helping clients stop advanced threats An International Energy Firm Analyzed 2B+ events per day to find 99.9%+ with 0 20-25 reported breaches in 3 yyears potential offenses to investigate 19 An International Commodities Exchange Maintained system uptimes of A Major Health Care Provider Monitors 25K+ endpoints d i t and blocked 200+ high risk infections in the first 6 months © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Leverage g intelligence g to help pp prevent fraud Comprehensive solution built upon real-time intelligence and adaptable protection Prevent “Root Cause” of Fraud Reduce Operational Impact Advanced Fraud Prevention Improve Your Customer Experience 20 Utilize Real-time Intelligence Service © 2014 IBM Corporation IBM Security Solutions 21 © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud IBM Security Portfolio Consulting and Managed Services Integrated Security Technologies Security Intelligence and Operations Security Intelligence and Analytics Strategy, Risk and Compliance Identity and Access Management Services Cloud and Managed Services Data and Application Security Services Advanced Fraud Protection Cybersecurity Assessment and Response Identity and Access Management Data Security Application Security Infrastructure and Threat Protection Advanced Threat and Security Research Key Security Trends Advanced Threats 22 Cloud Adoption Mobile Concerns Compliance Mandates Skills Shortage © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud 23 1 Cloud is an opportunity for enhanced i security 2 Build security into mobile deployments from day one 3 Stop advanced threats with security intelligence © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud IBM has global breadth and scale in Cloud, Mobile and Security Cloud Mobile Security 100+ 3,000 , + 1,700 , SaaS offerings mobile experts security patents 1,500 18 25 clo d patents cloud M bil Fi t studios MobileFirst t di global security sec rit labs 40K+ 8 15B+ mobile acquisitions security events monitored daily in 130 countries cloud experts 24 © 2014 IBM Corporation Visit us at… New Cloud Services and Apps in a Fraction of the Time IBM Engagement Zone Made With IBM Wednesday @ 10:15 am Dolphin Hotel Lobby Booth 10 Expo Dolphin, Southern 2 Join us at the IBM Cloud Café – Yacht and Beach Club Schedule your own IBM-supported hackathon. Develop apps in the time it takes to order a latte. 25 #THINKTech © 2014 IBM Corporation Re-imagine Enterprise Mobility and Security in the Era of Cloud Learn more IBM Security 26 IBM MobileFirst IBM Security Website IBM MobileFirst Website Watch our videos Download the IBV Mobile Study Read our blog Sign up for a free Mobile Agenda Workshop @ibmsecurity @ibmmobile © 2014 IBM Corporation Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part off a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. f References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, 27 © 2014 IBM Corporation or service names may be trademarks or service marks of others.
© Copyright 2024