© 2015 IBM Corporation
Enabling the enterprise
for the way the world works
Presenter
Title
IBM Security
June 13, 2016
IBM Mobile Security
2© 2015 IBM Corporation
by 2017
Mobile downloads
will increase to
268 billion
Gartner
by 2016
The number of smartphone
users worldwide will surpass
2 billion
eMarketer
Enterprise mobile trends
“Enterprise mobility will continue to be one of the hottest topics in IT,
and high on the list of priorities for all CIOs.”
Ovum
“IT organizations will dedicate at least 25% of their software budget
to mobile application development, deployment, and management by 2017.”
IDC
3© 2015 IBM Corporation
387new threats
every minute or more
than six every second
McAfee
As mobile grows, so do security threats
“With the growing penetration of mobile devices in the enterprise, security testing
and protection of mobile applications and data become mandatory.”
Gartner
“Enterprise mobility… new systems of engagement.
These new systems help firms empower their customers, partners,
and employees with context-aware apps and smart products.”
Forrester
Arxan
Top mobile devices
and apps hacked 97%Android
87%iOS
4© 2015 IBM Corporation
What concerns does this create for the enterprise?
Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity”
32% are concerned about
fraudulent transactions
Only 18% can detect
malware / jailbreaks
52% worry about
application vulnerabilities
Only 23% have
tamper-proofing capabilities
50% are content and data leakage
are their top security concern
60% use secure containers
for data security
57% say a lost or stolen device
is top concern
60% use passcodes
for device security
5© 2015 IBM Corporation
MobileFirst
Protect (MaaS360)
AppScan, Arxan, Trusteer M;
bile SDK
IBM Mobile Security Framework
AirWatch, MobileIron, Good,
Citrix, Microsoft, Mocana
HP Fortify, Veracode, Proguard CA, Oracle, RSA
• Manage multi-OS BYOD
environment
• Mitigate risks of lost and
compromised devices
• Separate enterprise
and personal data
• Enforce compliance
with security policies
• Distribute and control
enterprise apps
• Build and secure apps
and protect them
“in the wild”
• Provide secure web,
mobile, API access
and identify device risk
• Meet authentication
ease-of-use expectation
Extend Security Intelligence
• Extend security information and event management (SIEM) to mobile platform
• Incorporate mobile log management, anomaly detection, configuration and vulnerability management
Manage Access
and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
6© 2015 IBM Corporation
IBM Mobile Security Portfolio
IBM
Security
Access
Manager
IBM
DataPower
Gateway
IBM
BigFix
IBM
MobileFirst
Platform
IBM
MobileFirst
Protect
MaaS360
IBM
Security
AppScan
Arxan
Application
Protection
for IBM
Solutions
IBM QRadar
Security
Intelligence
Platform
IBM
Security
Trusteer
IBM
Mobile
Security
Services
7© 2015 IBM Corporation
Protecting devices
Every three minutes, a mobile device is wiped
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
46%
say their smartphone
is something they couldn’t live without
Source: “6 facts about Americans and their smartphones”
by Pew Research Center, April 2015
87%
By 2017, mobile devices will make up
of Internet-enabled
technology total sales
Source: Lander Blog, “Five Online Marketing Trends for 2014,
April 2014
Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014
87%
have their smartphone
at their side,
day and night
78%
spend over 2 hours
a day using their
smartphones
68%
consider their
smartphone to be
a personal device
Millennials and their smartphones…
8© 2015 IBM Corporation
How do you protect your devices?
 Identify devices at risk
pre/post deployment?
 Ensure devices accessing
the network are encrypted?
 Mitigate risks of lost and
compromised devices?
 Identify and respond
to any device accessing
your corporate data?
 Deploy and manage a
multi-OS environment with BYOD?
 Remotely provision
policies and restrictions?
9© 2015 IBM Corporation
Deploy, manage and secure devices while mitigating
the risks of lost and compromised devices
Rapidly deploy devices
Streamline the device
provisioning, configuration
and enrollment process for
enterprise use over the air
Centrally manage devices
Embrace BYOD, corporate,
and shared device with
centralized policy and
control from a single console
Proactively secure devices
Implement dynamic policies
and compliance rules to
continuously monitor devices
and take automated action
10© 2015 IBM Corporation
Large manufacturer deploys successful BYOD program
with IBM MobileFirst Protect
Client securely enabled mobility from the corporate office worker
to the field service representative to better serve customers while
keeping sensitive data secure.
11© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Securing content and collaboration
“Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014
59% allow employees to share or collaborate on documents
if the company provides the mobile device
64%
"73 Astonishing E-Mail Marketing Statistics You Need to Know", Mark the Marketer, February 2014
of decision-makers read their
e-mail via mobile devices
60% of employees access content
from outside the office
“Productivity Anywhere, Anytime: Mobilize Your Business”, Box
12© 2015 IBM Corporation
How do you secure content and collaboration?
• Separate enterprise
and personal data?
• Prevent data leakage?
• Provide secure access
to sensitive data
• Enforce compliance
with security policies?
13© 2015 IBM Corporation
Separate enterprise and personal data enforcing
compliance with security policies
Enable the secure web
Provide access to intranet
sites and web apps, URL
filtering, and restrict cookies,
downloads, copy / paste
and print features
Separate work email
Contain email text and
attachments to prevent
data leakage, enforce
authentication, copy / paste
and forwarding restrictions
Collaborate on content
Ensure the availability of files
from repositories with
authentication, DLP controls,
secure edit and sync,
and selective wipe
14© 2015 IBM Corporation
A retail store chain uses IBM MobileFirst Protect
for faster service to its customers
Client empowered in-store customer service representatives with
shared smart devices to securely view inventory and merchandise
information while on the store floor.
15© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Safeguarding applications and data
2.2
Kaspersky Lab “IT Threat Evolution Report for Q1 of 2015”
billion malicious attacks on
computers and mobile devices
were blocked during Q1 2015
Gartner Press Release, May 2014
of all mobile security
breaches are through apps75%overall mobile app usage
grew in 201476%
Shopping, Productivity and Messaging Give Mobile
Another Stunning Growth Year”, Flurry Insights, January 2015
On average, a company tests less than
half of the mobile apps they build and…
never test apps to ensure
they are secure33%
Ponemon The State of Mobile Application Insecurity, February 2015
16© 2015 IBM Corporation
How can you safeguard applications and data?
• Develop secure mobile apps
and assess the security
of existing apps
• Secure apps against reverse
engineering and runtime
attacks
• Prevent deployment
of risky mobile apps
• Protect app data at rest
and in motion
• Distribute and control public
and enterprise apps
17© 2015 IBM Corporation
Build, test and secure mobile apps before distributing
to end users
Safely distribute apps
Deploy custom enterprise
app catalogs; blacklist,
whitelist and require
apps; administer app
volume purchase
programs
Test app security
Identify vulnerabilities
in development and
pre-deployment;
isolate data leakage
risks; ensure proper
use of cryptography
Protect apps
Harden mobile apps
to defend against
reverse engineering;
prevent repacking
of apps; protect apps
from mobile malware
Secure app data
Protect enterprise apps
with authentication,
tunneling, copy / paste
restrictions and prevent
access from
compromised devices
18© 2015 IBM Corporation
A hospital uses IBM Mobile Security to build a secure
and protected patient care app
Doctors, nurses, and non-hospital employees share timely patient
information and test results on multiple devices to manage care
while protecting sensitive information
19© 2015 IBM Corporation
Manage access and fraud
“The CyberVor gang amassed over 4.5billionrecords,
mostly consisting of stolen credentials.
To get such an impressive number of credentials,
the CyberVors robbed over 420,000 web and FTP sites.”
Hold Security
$6.53 millionaverage cost of a U.S. data breach
2015 Cost of Data Breach Study, Ponemon Institute
95% of financial services incidents
involve harvesting credentials
stolen from customer devices
2015 Verizon Data Breech Report
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
“The CyberVor gang amassed over 4.5 billion
records, mostly consisting of stolen credentials. To get such an impressive
number of credentials, the CyberVors robbed over 420,000 web and FTP sites.”
Hold Security
$6.53 million
average cost of a U.S. data breach
2015 Cost of Data Breach Study, Ponemon Institute
95% of financial services incidents
involve harvesting credentials
stolen from customer devices
2015 Verizon Data Breech Report
20© 2015 IBM Corporation
How can you manage access and fraud?
 How do you deliver mobile security
capabilities in a consistent manner
to address:
- Web services / APIs
- Traditional web access
 How do you maintain mobility
authentication ease-of-use
expectations?
 Can you ensure that security features
are not being sacrificed as the pace
of mobile development and
deployment accelerates?
 Can you prevent access from high
risk or compromised mobile devices?
21© 2015 IBM Corporation
Prevent unauthorized access and transactions
by mobile users
Adaptive access
polices
Dynamic and adaptive
access policies provide risk
and context aware policy
enforcement while maintaining
ease-of-use expectations
Consolidated
enforcement point
A single point of secure
access control and
authentication for APIs
and mobile apps enabling
mobile single-sign-on
Integrated device
risk management
Manage risk from rooted /
jailbroken devices and from
mobile malware integrated
into access control polices and
BYOD content management
22© 2015 IBM Corporation
Company and independent agents access policy information in
corporate offices or field, access policies dynamically change based
on risk factors to ensure confidentiality and compliance
An insurance company uses IBM Security Access Manager
and Mobile Threat Management to keep customer data safe
23© 2015 IBM Corporation
Extend Security Intelligence
Manage
Access and Fraud
Safeguard
Applications and Data
Secure Content
and Collaboration
Protect
Devices
Extend security intelligence
Annual Threat Report on Advanced Targeted Attacks, Mandiant
Attackers spend an estimated
243 days on a victim’s network
before being discovered
Annual U.S. cost of a cyber-crime is
$11.56 million
per organization
Cyber-Crime Costs Continue to Rise: Study, eWeek
63%of victims were made aware
of breaches by an external organization
Annual Threat Report on Advanced Targeted Attacks, Mandiant
24© 2015 IBM Corporation
How can you extend security intelligence?
 Increasingly
sophisticated
mobile attack methods
 BYOD resulting in
disappearing
perimeters
 Accelerating mobile
security breaches
 Infrastructure changing
to support mobile
 Too many products from
multiple vendors; costly
to configure and manage
 Inadequate and
ineffective tools
 Struggling security teams
 Mobile providing
additional data sources
with limited manpower
and skills to manage it all
 Managing and monitoring
increasing compliance
demands
25© 2015 IBM Corporation
Gaining insights across the entire security event timeline
Prioritize Events
Quickly analyze very large
volumes of collected data
(events and logs) to get to
a manageably small number
of true incidents to be further
analyzed
Identify Threats
Detect configuration errors
and other deviations from
the norm in order to gain
awareness of vulnerabilities
and assess exposures
Take Corrective Action
Dramatically reduce the
time to remediation and
increase the thoroughness
of that remediation
26© 2015 IBM Corporation
An international energy company parses billions
of events per day to find those that should be investigated
An international energy firm analyzes
2 billion
events per day to find 20-25potential offenses to investigate
27© 2015 IBM Corporation
Summary
 Enterprise mobility management is needed and necessary
 MDM is a good place to start but additional security required
 Need to account for device risk
 Must build secure mobile apps
and must secure apps “in the wild”
 Identity and access security must be
adaptive – contextually aware
Think of mobile security more holistically
• Broader than MDM
• Think… device, content, application, and access
• More than a collection of point products
• Must scale to address enterprise requirements
28© 2015 IBM Corporation
Learn more about IBM Security
V2015-11-23
countries where IBM delivers
managed security services
industry analyst reports rank
IBM Security as a LEADER
enterprise security vendor
in total revenue
clients protected
including…
130+
25
No. 1
12K+
90% of the Fortune 100
companies
Join IBM X-Force Exchange
xforce.ibmcloud.com
Visit our website
ibm.com/security
Watch our videos on YouTube
IBM Security Channel
Read new blog posts
SecurityIntelligence.com
Follow us on Twitter
@ibmsecurity
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor
shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use
of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product
or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries
or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside
your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks
on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access.
IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other
systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE
IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
THANK YOU
www.ibm.com/security
Information concerning non-IBM products was obtained from the suppliers of those
products, their published announcements or other publicly available sources. IBM has
not tested those products in connection with this publication and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers
of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM
EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant
any right or license under any IBM patents, copyrights, trademarks or other intellectual
property right.
Other company, product, or service names may be trademarks or service marks of
others. A current list of IBM trademarks is available at “Copyright and
trademark information” www.ibm.com/legal/copytrade.shtml
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this
document may be reproduced or transmitted in any form without written permission from
IBM.
U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have
not yet been announced by IBM) has been reviewed for accuracy as of the date of initial
publication and could include unintentional technical or typographical errors. IBM shall
have no responsibility to update this information. THIS document is distributed "AS IS"
without any warranty, either express or implied. In no event shall IBM be liable for any
damage arising from the use of this information, including but not limited to, loss of data,
business interruption, loss of profit or loss of opportunity.
IBM products and services are warranted according to the terms and conditions of the
agreements under which they are provided.
Any statements regarding IBM’s future direction, intent or product plans are subject to
change or withdrawal without notice. Performance data contained herein was generally
obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may
have achieved. Actual performance, cost, savings or other results in other operating
environments may vary. References in this document to IBM products, programs, or
services does not imply that IBM intends to make such products, programs or services
available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent
session speakers, and do not necessarily reflect the views of IBM. All materials and
discussions are provided for informational purposes only, and are neither intended to,
nor shall constitute legal or other guidance or advice to any individual participant or their
specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements
and to obtain advice of competent legal counsel as to the identification and interpretation
of any relevant laws and regulatory requirements that may affect the customer’s business
and any actions the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products will ensure that
the customer is in compliance with any law.
Legal notices and disclaimers
31© 2015 IBM Corporation
IBM is the ONLY leader in 8 Mobile related Gartner Magic
Quadrants
Enterprise Mobility
Management Suites
June 2015
Client Management
Tools
May 2014
Managed Mobility
Services
July 2014
Mobile Application
Development Platforms
August 2015
Application
Security Testing
August 2015
Security Information
and Event Management
July 2015
Enterprise Content
Management
September 2014
Identity, Governance,
Access
August 2014
32© 2015 IBM Corporation
Securely manage the diversity of endpoints
IBM BigFix and IBM MobileFirst Protect
Any device
 Identify and respond to any device accessing your
corporate data—regardless of what type it is or
whether it’s personal or corporate-owned
Any data
 Protect corporate and sensitive apps, content and
transactions in a secure container, whether in motion
or at rest, preventing costly data loss scenarios
Any location
 Manage and secure every unique device—whether it’s
on or off your corporate network—anywhere on the
planet
Any time
 Get real-time visibility and control of every device on
your network; find and fix problems in minutes—before
they become major disruptions
Consolidated view of managed endpoints
33© 2015 IBM Corporation
Leading expertise to help optimize your security program
Deploy
Optimize
Build
Plan
Design
 Identify capability gaps, plan and deploy
a robust strategy and roadmap to close them
 Gain insight to prioritize security investments
 Deploy intelligence-driven security capabilities
 Optimize your ability to react to and
contain events, while reducing impact
SOC Transformation
Build next generation security operations
Security Maturity
Assess and transform your security posture
Metrics
Technology
Governance
Process
Organization
IBM Security Strategy, Intelligence and Operations Consulting Services

More Related Content

PPTX
Top 2016 Mobile Security Threats and your Employees
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
Mobile Threat Management
PDF
2015 Mobile Security Trends: Are You Ready?
PDF
State ofmobilesecurity
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
Information Risk and Protection
PDF
IBM Mobile Analyzer Saves the Day
Top 2016 Mobile Security Threats and your Employees
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Mobile Threat Management
2015 Mobile Security Trends: Are You Ready?
State ofmobilesecurity
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Information Risk and Protection
IBM Mobile Analyzer Saves the Day

What's hot (20)

PDF
8 Principales Raisons de Passer du MDM à l'EMM
PPTX
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
PDF
Weathering mobile-storm-report-october-2014
PDF
What are top 7 cyber security trends for 2020
PDF
Retail Mobility, Productivity and Security
PPTX
Symantec Mobile Security
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PDF
IBM Security - 2015 - Client References Guide
PDF
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
PPTX
Stratégies de croissance via la mobilité (ems)
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Recent ECB/ EBA regulations how they will impact European banks in 2016
PDF
Améliorer la productivité des employés et se protéger contre les menaces ...
PDF
IBM MaaS360 with watson
PDF
Rochester Security Event
PDF
SecurityWhitepaper 7-1-2015
PPTX
QRadar & XGS: Stopping Attacks with a Click of the Mouse
PDF
Avoiding the Data Compliance "Hot Seat"
PDF
10 Security Essentials Every CxO Should Know
8 Principales Raisons de Passer du MDM à l'EMM
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Weathering mobile-storm-report-october-2014
What are top 7 cyber security trends for 2020
Retail Mobility, Productivity and Security
Symantec Mobile Security
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security - 2015 - Client References Guide
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Stratégies de croissance via la mobilité (ems)
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Recent ECB/ EBA regulations how they will impact European banks in 2016
Améliorer la productivité des employés et se protéger contre les menaces ...
IBM MaaS360 with watson
Rochester Security Event
SecurityWhitepaper 7-1-2015
QRadar & XGS: Stopping Attacks with a Click of the Mouse
Avoiding the Data Compliance "Hot Seat"
10 Security Essentials Every CxO Should Know
Ad

Viewers also liked (6)

PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPT
IBM Endpoint Manager V9.0
PPTX
IBM Endpoint Manager for Lifecycle Management (Overview)
PDF
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
PPT
Big Fix Architectural Overview
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Endpoint Manager V9.0
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
Big Fix Architectural Overview
Ad

Similar to IBM Seguridad Móvil - Acompaña tu estrategia BYOD (20)

PPTX
Are We There Yet? The Path Towards Securing the Mobile Enterprise
PDF
Simple and secure mobile cloud access
PDF
Smarter Commerce Summit - IBM MobileFirst Services
PPT
MDM is not Enough - Parmelee
PDF
Infographic: Mobile is growing and so are security threats
PDF
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Pulse 2014.mobile first.security
PPTX
Mobile Payments: Protecting Apps and Data from Emerging Risks
PPTX
Outside the Office: Mobile Security
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PPT
IBM Partner Jam - 10th April 2013
PDF
Securely Adopting Mobile Technology Innovations
PDF
mHealth Summit EU 2015
PDF
Ibm mobile first protect (maas360)
PPTX
Mobility 101 : Provision
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Why You'll Care More About Mobile Security in 2020
PDF
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Simple and secure mobile cloud access
Smarter Commerce Summit - IBM MobileFirst Services
MDM is not Enough - Parmelee
Infographic: Mobile is growing and so are security threats
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Best practices for mobile enterprise security and the importance of endpoint ...
Pulse 2014.mobile first.security
Mobile Payments: Protecting Apps and Data from Emerging Risks
Outside the Office: Mobile Security
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
IBM Partner Jam - 10th April 2013
Securely Adopting Mobile Technology Innovations
mHealth Summit EU 2015
Ibm mobile first protect (maas360)
Mobility 101 : Provision
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You'll Care More About Mobile Security in 2020
Tour d'horizons de la Sécurité Mobile en 2015 et prédictions 2016

More from Camilo Fandiño Gómez (11)

PDF
IBM Security QFlow & Vflow
PDF
Whitepaper IBM Qradar Security Intelligence
PDF
IBM QRadar Security Intelligence Overview
PDF
Whitepaper IBM Guardium Data Activity Monitor
PDF
Guardium Data Activiy Monitor For C- Level Executives
PDF
IBM Security SaaS IaaS and PaaS
PDF
IBM QRadar Security Intelligence Overview
PDF
IBM Cloud Security Enforcer
PPTX
IBM Security Strategy
PDF
Conoce la Seguridad Cognitiva
PDF
Top 10 razones para no necesitar un MDM
IBM Security QFlow & Vflow
Whitepaper IBM Qradar Security Intelligence
IBM QRadar Security Intelligence Overview
Whitepaper IBM Guardium Data Activity Monitor
Guardium Data Activiy Monitor For C- Level Executives
IBM Security SaaS IaaS and PaaS
IBM QRadar Security Intelligence Overview
IBM Cloud Security Enforcer
IBM Security Strategy
Conoce la Seguridad Cognitiva
Top 10 razones para no necesitar un MDM

Recently uploaded (20)

PPTX
SAP Business AI_L1 Overview_EXTERNAL.pptx
PPTX
Human-Computer Interaction for Lecture 1
PDF
What Makes a Great Data Visualization Consulting Service.pdf
PPTX
Swiggy API Scraping A Comprehensive Guide on Data Sets and Applications.pptx
PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PDF
Top 10 Project Management Software for Small Teams in 2025.pdf
PDF
Ragic Data Security Overview: Certifications, Compliance, and Network Safegua...
PPTX
Comprehensive Guide to Digital Image Processing Concepts and Applications
PDF
Engineering Document Management System (EDMS)
PDF
Odoo Construction Management System by CandidRoot
PPTX
Lesson-3-Operation-System-Support.pptx-I
PDF
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
PPTX
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
PDF
Streamlining Project Management in Microsoft Project, Planner, and Teams with...
PDF
Building an Inclusive Web Accessibility Made Simple with Accessibility Analyzer
PPT
3.Software Design for software engineering
PDF
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
PDF
Understanding the Need for Systemic Change in Open Source Through Intersectio...
PDF
Mobile App for Guard Tour and Reporting.pdf
PPTX
UNIT II: Software design, software .pptx
SAP Business AI_L1 Overview_EXTERNAL.pptx
Human-Computer Interaction for Lecture 1
What Makes a Great Data Visualization Consulting Service.pdf
Swiggy API Scraping A Comprehensive Guide on Data Sets and Applications.pptx
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
Top 10 Project Management Software for Small Teams in 2025.pdf
Ragic Data Security Overview: Certifications, Compliance, and Network Safegua...
Comprehensive Guide to Digital Image Processing Concepts and Applications
Engineering Document Management System (EDMS)
Odoo Construction Management System by CandidRoot
Lesson-3-Operation-System-Support.pptx-I
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
WJQSJXNAZJVCVSAXJHBZKSJXKJKXJSBHJBJEHHJB
Streamlining Project Management in Microsoft Project, Planner, and Teams with...
Building an Inclusive Web Accessibility Made Simple with Accessibility Analyzer
3.Software Design for software engineering
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
Understanding the Need for Systemic Change in Open Source Through Intersectio...
Mobile App for Guard Tour and Reporting.pdf
UNIT II: Software design, software .pptx

IBM Seguridad Móvil - Acompaña tu estrategia BYOD

  • 1. © 2015 IBM Corporation Enabling the enterprise for the way the world works Presenter Title IBM Security June 13, 2016 IBM Mobile Security
  • 2. 2© 2015 IBM Corporation by 2017 Mobile downloads will increase to 268 billion Gartner by 2016 The number of smartphone users worldwide will surpass 2 billion eMarketer Enterprise mobile trends “Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.” Ovum “IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.” IDC
  • 3. 3© 2015 IBM Corporation 387new threats every minute or more than six every second McAfee As mobile grows, so do security threats “With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory.” Gartner “Enterprise mobility… new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.” Forrester Arxan Top mobile devices and apps hacked 97%Android 87%iOS
  • 4. 4© 2015 IBM Corporation What concerns does this create for the enterprise? Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity” 32% are concerned about fraudulent transactions Only 18% can detect malware / jailbreaks 52% worry about application vulnerabilities Only 23% have tamper-proofing capabilities 50% are content and data leakage are their top security concern 60% use secure containers for data security 57% say a lost or stolen device is top concern 60% use passcodes for device security
  • 5. 5© 2015 IBM Corporation MobileFirst Protect (MaaS360) AppScan, Arxan, Trusteer M; bile SDK IBM Mobile Security Framework AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana HP Fortify, Veracode, Proguard CA, Oracle, RSA • Manage multi-OS BYOD environment • Mitigate risks of lost and compromised devices • Separate enterprise and personal data • Enforce compliance with security policies • Distribute and control enterprise apps • Build and secure apps and protect them “in the wild” • Provide secure web, mobile, API access and identify device risk • Meet authentication ease-of-use expectation Extend Security Intelligence • Extend security information and event management (SIEM) to mobile platform • Incorporate mobile log management, anomaly detection, configuration and vulnerability management Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices
  • 6. 6© 2015 IBM Corporation IBM Mobile Security Portfolio IBM Security Access Manager IBM DataPower Gateway IBM BigFix IBM MobileFirst Platform IBM MobileFirst Protect MaaS360 IBM Security AppScan Arxan Application Protection for IBM Solutions IBM QRadar Security Intelligence Platform IBM Security Trusteer IBM Mobile Security Services
  • 7. 7© 2015 IBM Corporation Protecting devices Every three minutes, a mobile device is wiped Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices 46% say their smartphone is something they couldn’t live without Source: “6 facts about Americans and their smartphones” by Pew Research Center, April 2015 87% By 2017, mobile devices will make up of Internet-enabled technology total sales Source: Lander Blog, “Five Online Marketing Trends for 2014, April 2014 Source: “55 US Mobile Facts Every Marketer Needs For 2015” by Heidi Cohen, December 2014 87% have their smartphone at their side, day and night 78% spend over 2 hours a day using their smartphones 68% consider their smartphone to be a personal device Millennials and their smartphones…
  • 8. 8© 2015 IBM Corporation How do you protect your devices?  Identify devices at risk pre/post deployment?  Ensure devices accessing the network are encrypted?  Mitigate risks of lost and compromised devices?  Identify and respond to any device accessing your corporate data?  Deploy and manage a multi-OS environment with BYOD?  Remotely provision policies and restrictions?
  • 9. 9© 2015 IBM Corporation Deploy, manage and secure devices while mitigating the risks of lost and compromised devices Rapidly deploy devices Streamline the device provisioning, configuration and enrollment process for enterprise use over the air Centrally manage devices Embrace BYOD, corporate, and shared device with centralized policy and control from a single console Proactively secure devices Implement dynamic policies and compliance rules to continuously monitor devices and take automated action
  • 10. 10© 2015 IBM Corporation Large manufacturer deploys successful BYOD program with IBM MobileFirst Protect Client securely enabled mobility from the corporate office worker to the field service representative to better serve customers while keeping sensitive data secure.
  • 11. 11© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Securing content and collaboration “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014 59% allow employees to share or collaborate on documents if the company provides the mobile device 64% "73 Astonishing E-Mail Marketing Statistics You Need to Know", Mark the Marketer, February 2014 of decision-makers read their e-mail via mobile devices 60% of employees access content from outside the office “Productivity Anywhere, Anytime: Mobilize Your Business”, Box
  • 12. 12© 2015 IBM Corporation How do you secure content and collaboration? • Separate enterprise and personal data? • Prevent data leakage? • Provide secure access to sensitive data • Enforce compliance with security policies?
  • 13. 13© 2015 IBM Corporation Separate enterprise and personal data enforcing compliance with security policies Enable the secure web Provide access to intranet sites and web apps, URL filtering, and restrict cookies, downloads, copy / paste and print features Separate work email Contain email text and attachments to prevent data leakage, enforce authentication, copy / paste and forwarding restrictions Collaborate on content Ensure the availability of files from repositories with authentication, DLP controls, secure edit and sync, and selective wipe
  • 14. 14© 2015 IBM Corporation A retail store chain uses IBM MobileFirst Protect for faster service to its customers Client empowered in-store customer service representatives with shared smart devices to securely view inventory and merchandise information while on the store floor.
  • 15. 15© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Safeguarding applications and data 2.2 Kaspersky Lab “IT Threat Evolution Report for Q1 of 2015” billion malicious attacks on computers and mobile devices were blocked during Q1 2015 Gartner Press Release, May 2014 of all mobile security breaches are through apps75%overall mobile app usage grew in 201476% Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015 On average, a company tests less than half of the mobile apps they build and… never test apps to ensure they are secure33% Ponemon The State of Mobile Application Insecurity, February 2015
  • 16. 16© 2015 IBM Corporation How can you safeguard applications and data? • Develop secure mobile apps and assess the security of existing apps • Secure apps against reverse engineering and runtime attacks • Prevent deployment of risky mobile apps • Protect app data at rest and in motion • Distribute and control public and enterprise apps
  • 17. 17© 2015 IBM Corporation Build, test and secure mobile apps before distributing to end users Safely distribute apps Deploy custom enterprise app catalogs; blacklist, whitelist and require apps; administer app volume purchase programs Test app security Identify vulnerabilities in development and pre-deployment; isolate data leakage risks; ensure proper use of cryptography Protect apps Harden mobile apps to defend against reverse engineering; prevent repacking of apps; protect apps from mobile malware Secure app data Protect enterprise apps with authentication, tunneling, copy / paste restrictions and prevent access from compromised devices
  • 18. 18© 2015 IBM Corporation A hospital uses IBM Mobile Security to build a secure and protected patient care app Doctors, nurses, and non-hospital employees share timely patient information and test results on multiple devices to manage care while protecting sensitive information
  • 19. 19© 2015 IBM Corporation Manage access and fraud “The CyberVor gang amassed over 4.5billionrecords, mostly consisting of stolen credentials. To get such an impressive number of credentials, the CyberVors robbed over 420,000 web and FTP sites.” Hold Security $6.53 millionaverage cost of a U.S. data breach 2015 Cost of Data Breach Study, Ponemon Institute 95% of financial services incidents involve harvesting credentials stolen from customer devices 2015 Verizon Data Breech Report Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices “The CyberVor gang amassed over 4.5 billion records, mostly consisting of stolen credentials. To get such an impressive number of credentials, the CyberVors robbed over 420,000 web and FTP sites.” Hold Security $6.53 million average cost of a U.S. data breach 2015 Cost of Data Breach Study, Ponemon Institute 95% of financial services incidents involve harvesting credentials stolen from customer devices 2015 Verizon Data Breech Report
  • 20. 20© 2015 IBM Corporation How can you manage access and fraud?  How do you deliver mobile security capabilities in a consistent manner to address: - Web services / APIs - Traditional web access  How do you maintain mobility authentication ease-of-use expectations?  Can you ensure that security features are not being sacrificed as the pace of mobile development and deployment accelerates?  Can you prevent access from high risk or compromised mobile devices?
  • 21. 21© 2015 IBM Corporation Prevent unauthorized access and transactions by mobile users Adaptive access polices Dynamic and adaptive access policies provide risk and context aware policy enforcement while maintaining ease-of-use expectations Consolidated enforcement point A single point of secure access control and authentication for APIs and mobile apps enabling mobile single-sign-on Integrated device risk management Manage risk from rooted / jailbroken devices and from mobile malware integrated into access control polices and BYOD content management
  • 22. 22© 2015 IBM Corporation Company and independent agents access policy information in corporate offices or field, access policies dynamically change based on risk factors to ensure confidentiality and compliance An insurance company uses IBM Security Access Manager and Mobile Threat Management to keep customer data safe
  • 23. 23© 2015 IBM Corporation Extend Security Intelligence Manage Access and Fraud Safeguard Applications and Data Secure Content and Collaboration Protect Devices Extend security intelligence Annual Threat Report on Advanced Targeted Attacks, Mandiant Attackers spend an estimated 243 days on a victim’s network before being discovered Annual U.S. cost of a cyber-crime is $11.56 million per organization Cyber-Crime Costs Continue to Rise: Study, eWeek 63%of victims were made aware of breaches by an external organization Annual Threat Report on Advanced Targeted Attacks, Mandiant
  • 24. 24© 2015 IBM Corporation How can you extend security intelligence?  Increasingly sophisticated mobile attack methods  BYOD resulting in disappearing perimeters  Accelerating mobile security breaches  Infrastructure changing to support mobile  Too many products from multiple vendors; costly to configure and manage  Inadequate and ineffective tools  Struggling security teams  Mobile providing additional data sources with limited manpower and skills to manage it all  Managing and monitoring increasing compliance demands
  • 25. 25© 2015 IBM Corporation Gaining insights across the entire security event timeline Prioritize Events Quickly analyze very large volumes of collected data (events and logs) to get to a manageably small number of true incidents to be further analyzed Identify Threats Detect configuration errors and other deviations from the norm in order to gain awareness of vulnerabilities and assess exposures Take Corrective Action Dramatically reduce the time to remediation and increase the thoroughness of that remediation
  • 26. 26© 2015 IBM Corporation An international energy company parses billions of events per day to find those that should be investigated An international energy firm analyzes 2 billion events per day to find 20-25potential offenses to investigate
  • 27. 27© 2015 IBM Corporation Summary  Enterprise mobility management is needed and necessary  MDM is a good place to start but additional security required  Need to account for device risk  Must build secure mobile apps and must secure apps “in the wild”  Identity and access security must be adaptive – contextually aware Think of mobile security more holistically • Broader than MDM • Think… device, content, application, and access • More than a collection of point products • Must scale to address enterprise requirements
  • 28. 28© 2015 IBM Corporation Learn more about IBM Security V2015-11-23 countries where IBM delivers managed security services industry analyst reports rank IBM Security as a LEADER enterprise security vendor in total revenue clients protected including… 130+ 25 No. 1 12K+ 90% of the Fortune 100 companies Join IBM X-Force Exchange xforce.ibmcloud.com Visit our website ibm.com/security Watch our videos on YouTube IBM Security Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 29. © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. THANK YOU www.ibm.com/security
  • 30. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. Other company, product, or service names may be trademarks or service marks of others. A current list of IBM trademarks is available at “Copyright and trademark information” www.ibm.com/legal/copytrade.shtml Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS document is distributed "AS IS" without any warranty, either express or implied. In no event shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM’s future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. Legal notices and disclaimers
  • 31. 31© 2015 IBM Corporation IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants Enterprise Mobility Management Suites June 2015 Client Management Tools May 2014 Managed Mobility Services July 2014 Mobile Application Development Platforms August 2015 Application Security Testing August 2015 Security Information and Event Management July 2015 Enterprise Content Management September 2014 Identity, Governance, Access August 2014
  • 32. 32© 2015 IBM Corporation Securely manage the diversity of endpoints IBM BigFix and IBM MobileFirst Protect Any device  Identify and respond to any device accessing your corporate data—regardless of what type it is or whether it’s personal or corporate-owned Any data  Protect corporate and sensitive apps, content and transactions in a secure container, whether in motion or at rest, preventing costly data loss scenarios Any location  Manage and secure every unique device—whether it’s on or off your corporate network—anywhere on the planet Any time  Get real-time visibility and control of every device on your network; find and fix problems in minutes—before they become major disruptions Consolidated view of managed endpoints
  • 33. 33© 2015 IBM Corporation Leading expertise to help optimize your security program Deploy Optimize Build Plan Design  Identify capability gaps, plan and deploy a robust strategy and roadmap to close them  Gain insight to prioritize security investments  Deploy intelligence-driven security capabilities  Optimize your ability to react to and contain events, while reducing impact SOC Transformation Build next generation security operations Security Maturity Assess and transform your security posture Metrics Technology Governance Process Organization IBM Security Strategy, Intelligence and Operations Consulting Services

Editor's Notes

  • #3: Mobility has forever transformed the way we work, communicate and socialize. Originating as a consumer-centric phenomena, mobility benefits have compelled organizations to rapidly adopt it as a way to boost employee productivity and customer engagement. Everywhere you look there are proof points and stats that point to the explosive growth in mobility. 1. The number of smartphone users worldwide will surpass 2 billion in 2016, according to new figures from eMarketer - - http://www.emarketer.com/Article/2-Billion-Consumers-Worldwide-Smartphones-by-2016/1011694#sthash.qRMTl192.dpuf 2. "By 2017, mobile apps will be downloaded more than 268 billion times" -- attribution is Garnter -http://www.gartner.com/newsroom/id/2654115
  • #4: 3. "There are 387 new threats every minute, or more than 6 every second." -- McAfee "Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015." http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf 4. Update Arxan data regarding mobile apps - source: Source: State of Security in the App Economy - “Apps Under Attack” (Dec 2014) - 97% of top paid Android apps have been hacked - 87% of top paid iOS apps have been hacked - 80% of the most popular free Android apps have been hacked 75% of the most popular free iOS apps have been hacked https://www.arxan.com/wp-content/uploads/assets1/pdf/State_of_Mobile_App_Security_2014_final.pdf
  • #5: At IBM we spend time thinking about a holistic solution to this problem. We think it needs to include the 4 key imperatives of enterprise mobility: the device itself, the enterprise content on it and the collaboration with others, the applications & data and managing device access and fraud. We surveyed hundreds of enterprises late last year about their mobile security journey. We concluded they are half way there: addressing the device and content layers, often with the deployment of enterprise mobility management suites, and starting to look at application security and managing access and fraud. Regardless of where you are in your own journey, we think you should consider the full roadmap and plan accordingly. Protect Devices Lost devices are the top security concern for 57% of organizations 60% use passcodes for device security; 71% can remote-wipe devices Secure Content and Collaboration Content theft / leakages are the top concern for 56% of organizations 60% use secure containers for data security; 40% restrict sharing of content Safeguard Applications and Data Application vulnerabilities are the top concern for 52% of organizations 41% use vulnerability scanners; only 23% have tamper-proofing capabilities Manage Access and Fraud 32% of organizations are concerned about fraudulent transactions 30% use risk scoring for transactions; only 18% can detect malware / jailbreaks Source: 2014 Information Security Media Group Survey, sponsored by IBM, “The State of Mobile Security Maturity”
  • #6: DONE As a technology leader, IBM Mobile Security has developed a Mobile Security framework with a dynamic approach to delivering a comprehensive mobile security strategy. It is a holistic approach to securing the four imperatives of enterprise mobility: the device, the enterprise content and data stored on it, the mobile applications used for employee productivity and the access and fraud concerns inherent with the devices. Underlying this, is an additional layer of protection and visibility through IBM’s security intelligence. Only by addressing all four imperatives can a company truly deploy a comprehensive mobile strategy and protect the assets and reputation of the enterprise. PROTECT DEVICES - Solutions to deploy and manage a diverse set of mobile devices and roaming devices from corporate owned assets to Bring Your Own Device (BYOD). SECURE CONTENT & COLLABORATION - Solutions to help secure file and document sharing across devices and SharePoint. SAFEGUARD APPLICATIONS & DATA – Solutions to develop applications with security by design. Protect enterprise data in both the applications you build and the applications you buy. MANAGE ACCESS & FRAUD – Solutions to help identify users and protect mobile sessions with customers, business partners, and temporary workers that are not part of your enterprise mobile management framework. EXTEND SECURITY INTELLIGENCE - A unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management.
  • #7: DONE IBM Mobile Security provides the most complete approach to mobile security allowing customers to implement a mobile security strategy that addresses devices, data, applications and users. These seamless solutions connect to your existing environment allowing you to implement any or all of the portfolio as your needs require. Designed to deliver an exceptional experience, these highly scalable security solutions, along with a unique threat intelligence platform, fuses context and risk awareness to maximize mobility management and security effectiveness.
  • #8: DONE Let’s start with our first imperative, Protect Devices….. Every 3 minutes, a device is wiped 87% of millennials always have their smartphone at their side, day and night 78% of millennials spend over 2 hours a day using their smartphones 68% of millennials consider their smartphone to be a personal device Source: Heidi Cohen December 2014 article, “55 US Mobile Facts Every Marketer Needs For 2015” http://heidicohen.com/2015-mobile-marketing/ According to a Pew Research Center report, “46% of smartphone owners say their smartphone is something they couldn't live without.” Source: http://www.pewresearch.org/fact-tank/2015/04/01/6-facts-about-americans-and-their-smartphones/ "By 2017, mobile devices will make up 87 percent of the total sales of Internet-enabled technology" Source: http://blog.landerapp.com/five-online-marketing-trends-for-2014/
  • #9: Speaker notes Neil?
  • #10: NEIL AND JIMMY TO PROVIDE SPEAKER NOTES RAPIDLY DEPLOY DEVICES – CENTRALLY MANAGE DEVICES – PROACTIVELY SECURE DEVICES -
  • #11: Speaker notes neil An large manufacturer deploys a BYOD program with IBM MobileFirst Protect to enable mobility from the corporate office worker to the field service representative to better serve customers while keeping sensitive data secure.
  • #12: DONE Next we look at our 2nd imperative, Secure Content and Collaboration 64% of decision-makers read their e-mail via mobile devices." "48% of e-mails are opened on mobile devices." Source: Mark The Marketer, https://markthemarketer.wordpress.com/2014/02/18/73-astonishing-e-mail-marketing-statistics-you-need-to-know - 59% of respondents say they allow employees to share or collaborate on documents if the company provides the mobile device Source: “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014 http://img.en25.com/Web/IntraLinks/%7B6988b757-8c9f-4d09-9dd6-da59f4083f1f%7D_Intralinks_Ponemon_Research_Report_Q4_2014%5B1%5D.pdf
  • #13: Speajer notes neil…Box content?
  • #14: Speaker notes neil, box content SEPARATE WORK EMAIL - ENABLE THE SECURE WEB - COLLABORATE ON CONTENT -
  • #15: NEIL AND JIMMY TO PROVIDE SPEAKER NOTES – what else can we add? Can we name the company? Any quantifiable benefits we can share? A retail store chain uses IBM MobileFirst Protect to empower in-store customer service representatives with shared smart devices to securely view inventory & merchandise information while on the store floor.
  • #16: DONE At this point we have talked about the first two pillars which are focused on protecting the device and securing the content and collaboration. Now we look into applications and data and what needs to be done to safeguard them. In 2014, IBM sponsored a study with the Ponemon Group “The State of Mobile Application Insecurity”. In this study we found that while companies are rapidly developing and deploying mobile applications, very few of them are taking steps to make sure that these applications are secure. There are 387 new threats every minute, or more than 6 every second." -- McAfee "Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015.“ Source: McAfee Labs Threats Report, February 2015 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf Through 2017, 75 percent of all mobile security breaches will be through apps, not through deep technical attacks on the OS, according to Gartner" Source: Gartner Press Release, May 2014 http://www.gartner.com/newsroom/id/2753017 "Overall mobile app usage grew by 76% in 2014 according to Flurry Analytics" Source: Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015 http://flurrymobile.tumblr.com/post/115194992530/shopping-productivity-and-messaging-give-mobile#.VM1WAWR4qPL
  • #17: Speaker notes – AppScan Speaker notes – ARXAN Speaker notes – MobileFirst Protect
  • #18: Requested from Neil J, Neil F and Jimmy T on 6/24 TEST APP SECURITY – PROTECT APPS – SECURE APP DATA – SAFELY DISTRIBUTE APPS –
  • #20: 95% OF THESE INCIDENTS INVOLVE HARVESTING CREDENTIALS STOLEN FROM CUSTOMER DEVICES, THEN LOGGING INTO WEB APPLICATIONS WITH THEM. Page 42 of Verizon Data Breech Report. $3.79 million Average total cost per data breach – Ponemon Institute Cost of Data Breach Study.“
  • #24: Not mobile specific data…..can we find some…”extending” The only beneficiaries besides successful hackers are security sellers. Need only think about the last holiday shopping season – with Target and Neiman Marcus and Michaels Match-up of above stats to sources: 243 days on a victim's network – https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks 32 days on average to resolve a cyber-crime - ( http://www.eweek.com/security/cyber-crime-costs-continue-to-rise-study.html ) Annual cost of Cyber Crime - $11.56M - ( http://www.eweek.com/security/cyber-crime-costs-continue-to-rise-study.html ) 38% of targets were attacked again - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks 63% of victims made aware of breaches by an external organization - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks
  • #26: The QRadar Security Intelligence Platform helps businesses gain visibility over their full security posture and across the entire security event timeline. The positioning of the main solutions shown here is a general positioning. Vulnerability Manager and Risk Manager deliver a large part of their value in the “pre-exploit” phase. They are focused on detecting configuration errors and other deviations from the norm, and attaining awareness of vulnerabilities and assessing exposures. Log Manager and SIEM deliver a large part of their value at the point where exploits must be detected and on into the remediation phase. The focus is on very quickly taking very large volumes of collected data (events and logs) and analyzing them to get to a manageably small number of true incidents to be further analyzed. Finally, Incident Forensics offers a great deal of its value in helping dramatically reduce the time to remediation and to increase the thoroughness of that remediation. ADDITIONAL NOTES No matter how many QRadar products are leveraged, or how many appliances constitute a client deployment, all capabilities are leveraged through a single console. The associated benefit is that there is a common interface delivering value in areas such as speed of operation, ease of adoption, transference of skills, and a universal learning curve. Designed from the beginning to integrate Log Management, SIEM, and Risk Management into one solution, the QRadar Security Intelligence platform delivers massive log management scale without any compromise on SIEM “Intelligence.” As indicated on the slide, the console integrates many useful data points provided by the different products. This view on the screen provides insights into what the attack was, who was responsible, what the targets were, and provides evidence and accompanying information and data that will help determine the right next steps to take. In summary, the client is made aware of the incident (that previously would have been hidden in a barrage of data). The client is told what its priority is and is given the information necessary to respond appropriately. And, the integrated console is robust. Do you need to do some searching? It is in there. Do you need to write some additional filter rules? It is in there. What about reporting? It is in there. It is a very comprehensive set of tools, and a “single pane of glass.” Also, if a client adds a new QRadar product into the mix, a tab appears for the product. It is visually and programmatically integrated into the Security Intelligence solution for the client.
  • #27: Client example: An international energy company reduces billions of events per day to find those that should be investigated Optimize threat analysis - An international energy firm analyzes 2 billion events per day to find 20-25 potential offenses to investigate Business challenge Reducing huge number of events to find the ones that need to be investigated Automating the process of analyzing security data Solutions (QRadar SIEM, QFlow, Risk Manager) Combined analysis of historical data with real-time alerts to gain a ‘big picture’ view and uncover patterns of unusual activity humans miss and immediately block suspected traffic
  • #29: IBM achieved the highest  enterprise security revenue of all vendors in 2014, according to Technology Business Research group’s Enterprise Security Market Forecast 2014-2019.   Note: Actual number of countries where IBM delivers managed security services is 134 as of Nov. 2015 90% of the Fortune 100 companies (based on 2014 Fortune 500 rankings) Source: 2015 MI IBM Security Heatmap
  • #31: Mandatory legal notices and disclaimers slide for external presentations
  • #32: <Presenter: Marketing team to update slide as MQs are released> We don’t just talk the talk. IBM is the only vendor with a leader position in 8 Gartner mobile magic quadrants.
  • #33: <Presenter: Slide to be used for BigFix discussions if needed> The broadest OS and device set in the industry from servers, PCs, Macs, tablets, smartphones, embedded and hardened devices, POS, and soon IoT
  • #34: Today’s rapidly evolving threat landscape demands smarter and more responsive managed security services. IBM Managed Security Services offer the industry-leading tools, technology and expertise to secure your information assets 24/7/365, often at a fraction of the cost of in-house security resources. Improve security IBM maintains the world's largest threat and vulnerability database Reduce cost Save up to 55% on information security management Lower risk Reliable protection with guaranteed service level agreements Security operations consulting from IBM provides specialists to help you assess and refine your strategy and then work with you to design a SOC with end-to-end threat management capabilities. Security operations consulting from IBM helps you establish a SOC designed to deliver a single view of security threats for real-time decision making. With these capabilities, you can: Optimize your ability to react to and contain cyber security events Reduce financial and operational impact to your business Develop a more proactive security posture