© 2014 IBM Corporation 
IBM Security Systems 
Are We There Yet? The Path Towards 
Securing the Mobile Enterprise 
Yishay Yovel 
Program Director, Fraud and Mobile Strategy 
IBM Security 
©1 2014 IBM Corporation
© 2014 IBM Corporation 
IBM Security Systems 
2 
ABOUT THE SURVEY
Survey Respondents Demographics 
Total Response: 209
Survey Respondents Demographics: Larger Enterprises
© 2014 IBM Corporation 
IBM Security Systems 
5 
IBM MOBILE SECURITY FRAMEWORK
Enterprise Applications 
and Cloud Services 
and Data Protection 
© 2014 IBM Corporation 
IBM Security Systems 
IBM Mobile Security Framework - Requirements 
6 
Security Intelligence 
Identity, Fraud, 
Transaction Security 
Application Security 
Content Security 
Enterprise 
Device Security 
Personal and 
Consumer 
DATA 
Device Security Content Security Application Security Transaction Security 
Provision, manage 
and secure 
Corporate and 
BYOD devices 
Secure enterprise 
content access 
and sharing 
Develop 
vulnerability free, 
tamper proof and 
risk aware 
applications 
Prevent and detect 
high risk mobile 
transactions from 
employees, 
customers and 
partners 
Security Intelligence 
A unified architecture for integrating mobile security information and event 
management (SIEM), log management, anomaly detection, and configuration and 
vulnerability management
© 2014 IBM Corporation 
IBM Security Systems 
7 
THE CURRENT STATE OF AFFAIRS
Survey Respondents Demographics : Mobile Attributes
Mobile Security incidents
Enterprises see a wide range of business and technical risks spanning 
all pillars of the framework, malware risk is emerging
Enterprises have rolled out core device/content security capabilities, 
application and transaction security capabilities are emerging
© 2014 IBM Corporation 
IBM Security Systems 
12 
DEVICE AND CONTENT SECURITY
Mobile Device, Content Management 
Enterprise doc catalog 
View, edit, create, & sync 
files across devices 
Protect and contain 
sensitive content 
Activate & manage users, 
devices & policies 
Enterprise app catalog 
Operations & service 
desk management 
Secure Productivity Suite 
Complete set of work 
tools & app security 
Identity & access controls 
Data leak prevention & 
app compliance rules 
Secure network access 
for business apps 
Extend content in 
corporate file repositories 
Access intranet sites 
Secure Document Sharing 
Mobile Enterprise 
Gateway 
Advanced Mobile 
Management
Enterprises deploy basic controls to address “device lost” scenario, 
extended requirements for “risky devices” emerging
Enterprise deploy secure containers to control enterprise content for 
BYOD, emerging capabilities for more granular content control
© 2014 IBM Corporation 
IBM Security Systems 
16 
APPLICATION SECURITY
© 2014 IBM Corporation 
IBM Security Systems 
IBM Application Security capabilities 
Application Security Management 
Assess 
business impact 
Inventory 
assets 
Test 
Applications 
Static 
Analysis 
17 IBM and Business Partner Only 
Determine 
compliance 
Measure status 
and progress 
Prioritize 
vulnerabilities 
Utilize resources effectively to identify and mitigate risk 
Dynamic 
Analysis 
Mobile 
Application 
Analysis 
Interactive 
Analysis 
Protect 
Deployed Applications 
Intrusion 
Prevention 
Database 
Activity 
Monitoring 
Web 
Application 
SIEM Firewall 
Mobile 
Application 
Protection
Appscan and Worklight: Integrated App development and vulnerability Scanning 
© 2014 IBM Corporation 
IBM Security Systems 
18 IBM and Business Partner Only
Enterprises address app security for their own apps, less focused on 
risk from 3rd party apps and theft of their own apps
© 2014 IBM Corporation 
IBM Security Systems 
20 
TRANSACTION SECURITY
Transaction security: New Breed of Financial Mobile Malware is 
coming
Transaction Security: Flagging malware infected devices, enables 
mobile fraud detection
Transaction security focuses on securing “flow”, limited focus on 
fraud risk (malware) and transaction anomalies
© 2014 IBM Corporation 
IBM Security Systems 
24 
FUTURE AREAS OF INVESTMENT
Investments spans all pillars of the maturity model
Beyond the basics, organizations are increasing focus on App Security, 
emerging interest in transaction security
Most organizations will increase mobile security budgets to reap the 
benefits of mobile productivity
© 2014 IBM Corporation 
IBM Security Systems 
28 
SUMMARY
© 2014 IBM Corporation 
IBM Security Systems 
Security solutions for the mobile enterprise 
Personal and 
Consumer 
29 
Security Intelligence 
Transaction Security 
Application Security 
Device Security Content Security Application Security Transaction Security 
• Enroll, provision and configure 
devices, settings and mobile 
policy 
• Fingerprint devices with a 
unique and persistent mobile 
device ID 
• Remotely Locate, Lock and 
Wipe lost or stolen devices 
• Enforce device security 
compliance: passcode, 
encryption, jailbreak / root 
detection 
• Restrict copy, paste and share 
• Integration with Connections, 
SharePoint, Box, Google Drive, 
Windows File Share 
• Secure access to corporate 
mail, calendar and contacts 
• Secure access to corporate 
intranet sites and network 
Software Development Lifecycle 
• Integrated Development 
Environment 
• iOS / Android Static Scanning 
Application Protection 
• App Wrapping or SDK Container 
• Hardening & Tamper 
Resistance 
IBM Business Partner (Arxan) 
• Run-time Risk Detection 
Malware, Jailbreak / Root, Device 
ID, and Location 
• Whitelist / Blacklist Applications 
Access 
• Mobile Access Management 
• Identity Federation 
• API Connectivity 
Transactions 
• Mobile Fraud Risk Detection 
• Cross-channel Fraud Detection 
• Browser Security / URL Filtering 
• IP Velocity 
Security Intelligence 
Enterprise Applications 
and Cloud Services 
Identity, Fraud, 
and Data Protection 
Content Security 
Device Security 
DATA 
Enterprise 
IBM Security 
AppScan 
IBM Security 
Access Manager 
IBM Mobile Security Solutions 
IBM Mobile Security Services 
Security Intelligence 
IBM Mobile First powered by… 
IBM QRadar Security 
Intelligence Platform
Summary 
• Enterprises are making investments across all pillars of the IBM Mobile 
Security Framework, but we are “half way there” 
• Current investment focus on device and content security which supports the 
BYOD program 
• Future investments will address the development of secure mobile applications 
end eventually transaction fraud risk 
• Use the IBM Mobile Security Framework to build a prioritized roadmap 
for your investments in mobile security for your BYOD program, 
Employee productivity and Customer Engagement 
• Follow this link: http://ibm.com/security/mobile
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection 
and response to improper access from within and outside your enterprise. Improper access can result in information being altered, 
destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. 
No IT system or product should be considered completely secure and no single product, service or security measure can be completely 
effective in preventing improper use or access. IBM systems, products and services are designed to be part of a comprehensive 
security approach, which will necessarily involve additional operational procedures, and may require other systems, products or 
services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR 
WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. 
© 2014 IBM Corporation 
IBM Security Systems 
31 
www.ibm.com/security 
© Copyright IBM Corporation 2014. THE INFORMATION IN THESE MATERIALS ARE PROVIDED "AS IS" WITHOUT ANY WARRANTY, 
EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE 
AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of 
the agreements under which they are provided. Nothing contained in these materials is intended to, nor shall have the effect of, 
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable 
license agreement governing the use of IBM software. These materials are current as of the initial date of publication and may be 
changed by IBM at any time. Not all offerings are available in every country in which IBM operates. Product release dates and/or 
capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other 
factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, ibm.com and 
other IBM products and services are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. 
Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the 
Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml

More Related Content

PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
Améliorer la productivité des employés et se protéger contre les menaces ...
PDF
IBM Mobile Analyzer Saves the Day
PDF
IBM MaaS360 with watson
PDF
Simple and secure mobile cloud access
PPTX
MaaS360 with Watson
PDF
Retail Mobility, Productivity and Security
PPTX
IBM MaaS360 with Watson
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Améliorer la productivité des employés et se protéger contre les menaces ...
IBM Mobile Analyzer Saves the Day
IBM MaaS360 with watson
Simple and secure mobile cloud access
MaaS360 with Watson
Retail Mobility, Productivity and Security
IBM MaaS360 with Watson

What's hot (20)

PDF
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
PDF
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PDF
Compliance is a pit stop – your destination lies ahead
PDF
Mobile Security for Smartphones and Tablets
PDF
How to Hack a Cryptographic Key
PDF
Cutting Through the Software License Jungle: Stay Safe and Control Costs
PDF
Smarter Commerce Summit - IBM MobileFirst Services
PDF
Laptop management
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
PPTX
IBM Security intelligence v1 - ahmed el nahas
PPTX
Follow the Money, Follow the Crime
PPTX
Symantec Mobile Security
PPTX
Mobility 301 : Protect
PDF
Pulse 2013 - How to run a successful BYOD initiative
PDF
Productivity Suite
PPTX
Mobility 101 : Provision
PDF
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
PDF
Rochester Security Event
PDF
Presentation cloud security the grand challenge
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Compliance is a pit stop – your destination lies ahead
Mobile Security for Smartphones and Tablets
How to Hack a Cryptographic Key
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Smarter Commerce Summit - IBM MobileFirst Services
Laptop management
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security intelligence v1 - ahmed el nahas
Follow the Money, Follow the Crime
Symantec Mobile Security
Mobility 301 : Protect
Pulse 2013 - How to run a successful BYOD initiative
Productivity Suite
Mobility 101 : Provision
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Rochester Security Event
Presentation cloud security the grand challenge
Ad

Similar to Are We There Yet? The Path Towards Securing the Mobile Enterprise (20)

PDF
2015 Mobile Security Trends: Are You Ready?
PPT
MDM is not Enough - Parmelee
PPTX
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
PDF
Pulse 2014.mobile first.security
PDF
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PPTX
Mobility 201 : Productivity
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PPTX
IBM Security Portfolio - 2015
PPT
IBM Partner Jam - 10th April 2013
PPT
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
PDF
Information Risk and Protection
PDF
Tecnologie a supporto dei controlli di sicurezza fondamentali
PDF
Mobile Threat Management
PDF
IBM - IAM Security and Trends
PDF
MobileFirst
PDF
8 Principales Raisons de Passer du MDM à l'EMM
PPTX
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
PPT
Smart security solutions for SMBs
PPTX
Take your SOC Beyond SIEM
2015 Mobile Security Trends: Are You Ready?
MDM is not Enough - Parmelee
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
Pulse 2014.mobile first.security
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Best practices for mobile enterprise security and the importance of endpoint ...
Mobility 201 : Productivity
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
IBM Security Portfolio - 2015
IBM Partner Jam - 10th April 2013
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
Information Risk and Protection
Tecnologie a supporto dei controlli di sicurezza fondamentali
Mobile Threat Management
IBM - IAM Security and Trends
MobileFirst
8 Principales Raisons de Passer du MDM à l'EMM
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Smart security solutions for SMBs
Take your SOC Beyond SIEM
Ad

More from IBM Security (20)

PPTX
Automation: Embracing the Future of SecOps
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Integrated Response with v32 of IBM Resilient
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PDF
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
How to Improve Threat Detection & Simplify Security Operations
PPTX
IBM QRadar UBA
PDF
Mobile Vision 2020
PDF
Close the Loop on Incident Response
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PPTX
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Automation: Embracing the Future of SecOps
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Integrated Response with v32 of IBM Resilient
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Accelerating SOC Transformation with IBM Resilient and Carbon Black
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Are You Ready to Move Your IAM to the Cloud?
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
WannaCry Ransomware Attack: What to Do Now
How to Improve Threat Detection & Simplify Security Operations
IBM QRadar UBA
Mobile Vision 2020
Close the Loop on Incident Response
Orchestrate Your Security Defenses; Protect Against Insider Threats
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...

Recently uploaded (20)

PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Five Habits of High-Impact Board Members
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Architecture types and enterprise applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Geologic Time for studying geology for geologist
Web Crawler for Trend Tracking Gen Z Insights.pptx
Five Habits of High-Impact Board Members
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Univ-Connecticut-ChatGPT-Presentaion.pdf
The various Industrial Revolutions .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Group 1 Presentation -Planning and Decision Making .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
Architecture types and enterprise applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A novel scalable deep ensemble learning framework for big data classification...
August Patch Tuesday
NewMind AI Weekly Chronicles – August ’25 Week III
Developing a website for English-speaking practice to English as a foreign la...
DP Operators-handbook-extract for the Mautical Institute
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Zenith AI: Advanced Artificial Intelligence
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Geologic Time for studying geology for geologist

Are We There Yet? The Path Towards Securing the Mobile Enterprise

  • 1. © 2014 IBM Corporation IBM Security Systems Are We There Yet? The Path Towards Securing the Mobile Enterprise Yishay Yovel Program Director, Fraud and Mobile Strategy IBM Security ©1 2014 IBM Corporation
  • 2. © 2014 IBM Corporation IBM Security Systems 2 ABOUT THE SURVEY
  • 3. Survey Respondents Demographics Total Response: 209
  • 4. Survey Respondents Demographics: Larger Enterprises
  • 5. © 2014 IBM Corporation IBM Security Systems 5 IBM MOBILE SECURITY FRAMEWORK
  • 6. Enterprise Applications and Cloud Services and Data Protection © 2014 IBM Corporation IBM Security Systems IBM Mobile Security Framework - Requirements 6 Security Intelligence Identity, Fraud, Transaction Security Application Security Content Security Enterprise Device Security Personal and Consumer DATA Device Security Content Security Application Security Transaction Security Provision, manage and secure Corporate and BYOD devices Secure enterprise content access and sharing Develop vulnerability free, tamper proof and risk aware applications Prevent and detect high risk mobile transactions from employees, customers and partners Security Intelligence A unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management
  • 7. © 2014 IBM Corporation IBM Security Systems 7 THE CURRENT STATE OF AFFAIRS
  • 8. Survey Respondents Demographics : Mobile Attributes
  • 10. Enterprises see a wide range of business and technical risks spanning all pillars of the framework, malware risk is emerging
  • 11. Enterprises have rolled out core device/content security capabilities, application and transaction security capabilities are emerging
  • 12. © 2014 IBM Corporation IBM Security Systems 12 DEVICE AND CONTENT SECURITY
  • 13. Mobile Device, Content Management Enterprise doc catalog View, edit, create, & sync files across devices Protect and contain sensitive content Activate & manage users, devices & policies Enterprise app catalog Operations & service desk management Secure Productivity Suite Complete set of work tools & app security Identity & access controls Data leak prevention & app compliance rules Secure network access for business apps Extend content in corporate file repositories Access intranet sites Secure Document Sharing Mobile Enterprise Gateway Advanced Mobile Management
  • 14. Enterprises deploy basic controls to address “device lost” scenario, extended requirements for “risky devices” emerging
  • 15. Enterprise deploy secure containers to control enterprise content for BYOD, emerging capabilities for more granular content control
  • 16. © 2014 IBM Corporation IBM Security Systems 16 APPLICATION SECURITY
  • 17. © 2014 IBM Corporation IBM Security Systems IBM Application Security capabilities Application Security Management Assess business impact Inventory assets Test Applications Static Analysis 17 IBM and Business Partner Only Determine compliance Measure status and progress Prioritize vulnerabilities Utilize resources effectively to identify and mitigate risk Dynamic Analysis Mobile Application Analysis Interactive Analysis Protect Deployed Applications Intrusion Prevention Database Activity Monitoring Web Application SIEM Firewall Mobile Application Protection
  • 18. Appscan and Worklight: Integrated App development and vulnerability Scanning © 2014 IBM Corporation IBM Security Systems 18 IBM and Business Partner Only
  • 19. Enterprises address app security for their own apps, less focused on risk from 3rd party apps and theft of their own apps
  • 20. © 2014 IBM Corporation IBM Security Systems 20 TRANSACTION SECURITY
  • 21. Transaction security: New Breed of Financial Mobile Malware is coming
  • 22. Transaction Security: Flagging malware infected devices, enables mobile fraud detection
  • 23. Transaction security focuses on securing “flow”, limited focus on fraud risk (malware) and transaction anomalies
  • 24. © 2014 IBM Corporation IBM Security Systems 24 FUTURE AREAS OF INVESTMENT
  • 25. Investments spans all pillars of the maturity model
  • 26. Beyond the basics, organizations are increasing focus on App Security, emerging interest in transaction security
  • 27. Most organizations will increase mobile security budgets to reap the benefits of mobile productivity
  • 28. © 2014 IBM Corporation IBM Security Systems 28 SUMMARY
  • 29. © 2014 IBM Corporation IBM Security Systems Security solutions for the mobile enterprise Personal and Consumer 29 Security Intelligence Transaction Security Application Security Device Security Content Security Application Security Transaction Security • Enroll, provision and configure devices, settings and mobile policy • Fingerprint devices with a unique and persistent mobile device ID • Remotely Locate, Lock and Wipe lost or stolen devices • Enforce device security compliance: passcode, encryption, jailbreak / root detection • Restrict copy, paste and share • Integration with Connections, SharePoint, Box, Google Drive, Windows File Share • Secure access to corporate mail, calendar and contacts • Secure access to corporate intranet sites and network Software Development Lifecycle • Integrated Development Environment • iOS / Android Static Scanning Application Protection • App Wrapping or SDK Container • Hardening & Tamper Resistance IBM Business Partner (Arxan) • Run-time Risk Detection Malware, Jailbreak / Root, Device ID, and Location • Whitelist / Blacklist Applications Access • Mobile Access Management • Identity Federation • API Connectivity Transactions • Mobile Fraud Risk Detection • Cross-channel Fraud Detection • Browser Security / URL Filtering • IP Velocity Security Intelligence Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Content Security Device Security DATA Enterprise IBM Security AppScan IBM Security Access Manager IBM Mobile Security Solutions IBM Mobile Security Services Security Intelligence IBM Mobile First powered by… IBM QRadar Security Intelligence Platform
  • 30. Summary • Enterprises are making investments across all pillars of the IBM Mobile Security Framework, but we are “half way there” • Current investment focus on device and content security which supports the BYOD program • Future investments will address the development of secure mobile applications end eventually transaction fraud risk • Use the IBM Mobile Security Framework to build a prioritized roadmap for your investments in mobile security for your BYOD program, Employee productivity and Customer Engagement • Follow this link: http://ibm.com/security/mobile
  • 31. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. © 2014 IBM Corporation IBM Security Systems 31 www.ibm.com/security © Copyright IBM Corporation 2014. THE INFORMATION IN THESE MATERIALS ARE PROVIDED "AS IS" WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. These materials are current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, ibm.com and other IBM products and services are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml