SESSION ID:
#RSAC
Michelle Waugh
Security in the App Economy
How to Ride the Wave Without Wiping Out!
SPO1-W02
Vice President, Security Solutions
CA Technologies
Are you rolling out new apps & services to your customers?
Are you using security to improve customer engagement?
Are you leveraging security to enable and drive business?
Have you had a breach in the last year -as far as you know?
#RSAC
Today, Every Company is a Software Company.
Are You?
6
From sneaker company to
data enabled athletic
brand.
From book seller to insight driven
delivery service, cloud servicer and
entertainment hub.
From UK Grocer to global consumer
retailer leveraging data and technology
that reframes the shopper experience.
In 2014, CEOs must focus on leading their organizations to think like and become
more like “tech” companies, because within a few years, digital business capabilities
will dominate every industry. Urgent action is needed because first-mover advantage
is common in digital business, and fast followers must be very fast.
Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
#RSAC
7
#RSAC
Traditional Approach to Security
#RSAC#RSAC
Security in the Open Enterprise
#RSAC
Ripped from the Headlines
#RSAC
Security concerns the top
obstacle in app economy#1
-- CA Technologies with Vanson Bourne
Overall IT spend
devoted to Security
over next 3 years
>25%
Leaders saw revenue
increase for security-
enabled services
(18% of Laggards)
47%
Security priority for
business is improving
mobile experience
#2
Increase in
breaches YoY from
2013 to 2014
78%
#RSAC
Security
#RSAC
Application Economy Requires Identity-centric Security
11
IDENTITY - CENTRIC
SECURITY
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
#RSAC
12
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
13
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
#RSAC
#RSAC
Simplify Anywhere, Anything Access
14
CUSTOMERS, EMPLOYEES, PARTNERS
Mobile
Apps
APIs/Web
Services
Web
Apps
From the
Cloud On-Premise
On
Device
Enable access from
any device
Coordinate security across
Web, mobile, APIs
Improve customer
adoption/experience/
loyalty
What you
need to do
#RSAC
The Application Economy is Driving the Rapid
Adoption of Mobile Applications
15
“By 2020, more than 63% of enterprises
expect their desktops to be replaced by
mobile devices connected to the network via
office wireless LAN”
Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales,
14 May 2014
79%of organizations are using SaaS
Sources: Ponemon Institute.
#RSAC
Enabling your Mobile Workforce is a Journey
Web API
Native AppWeb-App
Existing Web
Applications
New Native
App Projects
Unified
Access
Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
#RSAC
IAM + API Solution Enables Fast, Secure
Mobile Delivery of Enterprise Applications
17
Identity Manager
Cloud Apps
On-Premises Enterprise Apps
CA SSO ( SiteMinder ) / LDAP / IdP
CA Mobile API
Gateway
Paul Pronsati
EVP, Global Business Ops & CIO
BENEFITS
 Common standard
across platforms and
applications
 Improves developer
velocity and time to
value
 Application user and
device level security
OAUTH/API
SAML
SAML
SAML
CA Mobile
API Gateway
CA SSO
{SiteMinder} /
LDAP/ldP
On-Premises
Enterprise Apps
Identity Manager
#RSAC
Lessons in Mobility
18
 Begin with the user experience as the focus. Is login required?
 Review and define your architecture holistically; be prepared to move fast!
 Choose the app type that fits your use case and objective and implement a
solution that combines usability and security (native app SSO + web)
 Leverage your existing SSO implementation to improve the experience
 Engage the business now around what SaaS projects are coming up and
position the enterprise friendly vendors…say “yes” to BYOA
 Start thinking beyond front door access for SaaS
#RSAC
19
What you
need to be
thinking
about
#RSAC
PROTECT DATA WHILE
ENABLING BUSINESS
#RSAC
Security – By the Numbers
RECORDS
BREACHED IN 20141,023,108,267
NUMBER OF
BREACH INCIDENTS1,541 BREACHED RECORDS
INCREASE FROM LAST YEAR78%
Data records were lost or stolen with the following frequency
Every Day
2,803,036
Every Hour
116,793
Every Minute
1,947
Every Second
32
#RSAC
Protect Data While Enabling Business
21
 Device
 Geolocation
 Velocity
 User history
 Fraud patterns
PROTECT MOBILE
APP
STRONGLY
AUTHENTICATE
USERS
CONTROL ACCESS
TO WEB APPS
CONTROL ACCESS
TO APIS
SECURE
PRIVILEGED
IDENTITIES
Enable security from
end-to-end
Protect against insider threats
Defend against
external threats
What you
need to do
#RSAC
Combat Insider Threats and External Attacks
Systems
Data
Administrators
Employees
INSIDERS
CUSTOMERS
Web Apps
Strong,Risk-based
Authentication
Privileged
Identity
SSO with Session
Assurance
EXTERNAL
THREATS
BUSINESS VALUE
 Reduced risk of breach through fine-grained admin controls,
hypervisor security, and shared account management.
 Increase security and customer trust with strong, risk-aware
authentication
 Protect against session hijacking with unique session
assurance
PROOF POINTS
 CA Privileged Identity Manager is the ONLY solution that helps secure
critical systems at the OS kernel level
 CA PIM is protecting the systems at 9 out of the top 16 Fortune 25
companies
 CA Advanced Authentication enabled 64% of surveyed companies
improve their user experience
REQUIRED
CAPABILITIES
PIM
Advanced Authentication
SSO
#RSAC
Lessons in protecting your business
23
 Perimeter security is necessary, but not sufficient. You need to think end-to-
end and defend from the inside-out
 Think about your identities. Do your accounts have the right privileges?
Who certified access? Do you have orphaned accounts?
 Nearly all of the most damaging attacks use a privileged identity – focus
your attention here!
 Don’t think of insider threats as purely malicious employees: they can be
targeted with social engineering or can be careless
 Additional security doesn’t have to make the user experience more difficult.
Risk-awareness is essential - security gets applies only where needed
#RSAC
24
What you
need to be
thinking
about
#RSAC
EXTEND BUSINESS
WITH SECURITY
#RSAC
EXTENDING BUSINESS WITH SECURITY
25
Reduce infrastructure
Drive agility into the
business
Reduce need for
security expertise
What you
need to do
IDENTITY
AS A
SERVICE
#RSAC
26
170
Countries
6,500
Corporate & public
sector customers
3 million+
Direct customers
#RSAC
#RSAC
27
#RSAC
FOCUS ON CORE COMPETENCY
Our advice
Seek security expertise
BT’s approach
• Ensure they have depth and breadth of experience in
delivering service
• Remain engaged with your partner security expert
• Provide in-depth defence and incident response
• Around-the-clock protection from cyber threats
• Understand risks as organisation changes – when new
technologies are introduced, new vulnerabilities
presented
• Provide secure access to all remote and mobile workers
#RSAC
Lessons in Identity & Access as a Service
28
 Enable the business to outsource IT Security to managed services
and focus on your true business
 Become the identity provider for external as well as internal users
 Secure identity and access from end to end – from the device, user,
application, transmission, and though to the data source
#RSAC
29
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
Security Spend Must do More than Just Secure
30
Sell the business on business value
PROTECT THE BUSINESS
UNLEASH THE BUSINESS
Secure access
to on-premise
and cloud
applications
Govern user
access across
enterprise
Protect against
insider threats
and external
attacks
Accelerate
the delivery
of secure
apps
Deliver multi-
channel –
from Web to
Mobile to APIs
Enable bring
your own
identity
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
Success is the result of right choices.
Choose your waves wisely.
Unknown surfer, March, 2015
#RSAC
32
This is business,
rewritten by software™
#RSAC
#RSAC
Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks
and logos referenced herein belong to their respective companies.
This document is for your informational purposes only. CA assumes no responsibility
for the accuracy or completeness of the information. To the extent permitted by
applicable law, CA provides this document “as is” without warranty of any kind,
including, without limitation, any implied warranties of merchantability, fitness for a
particular purpose, or non-infringement. In no event will CA be liable for any loss or
damage, direct or indirect, from the use of this document, including, without
limitation, lost profits, business interruption, goodwill or lost data, even if CA is
expressly advised in advance of the possibility of such damages.
Thank You
#RSAC
For More Information
To learn more about Security,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlay
from following “More Info Graphics” slide here;
ensure it links to correct page
Security

More Related Content

PPTX
Zscaler mondi webinar
PPTX
Building Cyber Resilience at the Speed of Business
PPTX
Alpha & Omega's Managed Security
PPTX
Alpha & Omega Presentation
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PDF
Optimize Your Zero Trust Infrastructure
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Zscaler mondi webinar
Building Cyber Resilience at the Speed of Business
Alpha & Omega's Managed Security
Alpha & Omega Presentation
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Optimize Your Zero Trust Infrastructure
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...

What's hot (20)

PPTX
Empowering Digital Transformation in Financial Services
PPTX
Be the Hunter
PDF
API Security Needs AI Now More Than Ever
PDF
Mobile App Security Predictions 2019
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PPTX
Managing Identity without Boundaries
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PDF
Company_Profile_Updated_17032016
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PPTX
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
PDF
Clear and Present Danger
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PPTX
Identity Access Management 101
PPTX
Csa summit seguridad en el sddc
PDF
Secure your Business
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PPT
You Can't Spell Enterprise Security without MFA
PDF
Okta Digital Enterprise Report
Empowering Digital Transformation in Financial Services
Be the Hunter
API Security Needs AI Now More Than Ever
Mobile App Security Predictions 2019
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Managing Identity without Boundaries
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Company_Profile_Updated_17032016
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Clear and Present Danger
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Identity Access Management 101
Csa summit seguridad en el sddc
Secure your Business
Application Experience Analytics Services: The Strategic Digital Transformati...
You Can't Spell Enterprise Security without MFA
Okta Digital Enterprise Report
Ad

Similar to Security in the App Economy: How to Ride the Wave Without Wiping Out! (20)

PDF
Security as a Service with Microsoft Presented by Razor Technology
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
Rogers eBook Security
PDF
Understanding the “Why” in Enterprise Application Security Strategy
PPTX
Cybersecurity model and top cloud security controls for product development e...
PDF
Rsac2015 burns-fighting the right battle
PPTX
Track-2307_KUKREJA.potx
PPTX
BIS "Is Your Company at Risk for a Security Breach?"
PDF
RSA ASIA 2014 - Internet of Things
PDF
Realizing Software Security Maturity: The Growing Pains and Gains
PDF
Securing 100 products - How hard can it be?
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
Gartner Information Security Summit Brochure
PDF
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PDF
Exploring the Real-World Application Security Top 10
PDF
SBIC Enterprise Information Security Strategic Technologies
 
PDF
Efficacy Of Layered Application Security Through The Lens Of Hacker
Security as a Service with Microsoft Presented by Razor Technology
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Rogers eBook Security
Understanding the “Why” in Enterprise Application Security Strategy
Cybersecurity model and top cloud security controls for product development e...
Rsac2015 burns-fighting the right battle
Track-2307_KUKREJA.potx
BIS "Is Your Company at Risk for a Security Breach?"
RSA ASIA 2014 - Internet of Things
Realizing Software Security Maturity: The Growing Pains and Gains
Securing 100 products - How hard can it be?
“8th National Biennial Conference on Medical Informatics 2012”
Meraj Ahmad - Information security in a borderless world
Gartner Information Security Summit Brochure
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Exploring the Real-World Application Security Top 10
SBIC Enterprise Information Security Strategic Technologies
 
Efficacy Of Layered Application Security Through The Lens Of Hacker
Ad

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
PDF
How Components Increase Speed and Risk
PDF
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
PDF
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
PDF
When You Test Matters: Why Testing Early in the SDLC is Important
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
How Components Increase Speed and Risk
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
When You Test Matters: Why Testing Early in the SDLC is Important

Recently uploaded (20)

PPTX
Internet of Everything -Basic concepts details
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
Microsoft User Copilot Training Slide Deck
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Internet of Everything -Basic concepts details
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Microsoft User Copilot Training Slide Deck
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Advancing precision in air quality forecasting through machine learning integ...
Lung cancer patients survival prediction using outlier detection and optimize...
EIS-Webinar-Regulated-Industries-2025-08.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
MuleSoft-Compete-Deck for midddleware integrations
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Basics of Cloud Computing - Cloud Ecosystem
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Module 1 Introduction to Web Programming .pptx
Data Virtualization in Action: Scaling APIs and Apps with FME
future_of_ai_comprehensive_20250822032121.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION

Security in the App Economy: How to Ride the Wave Without Wiping Out!

  • 1. SESSION ID: #RSAC Michelle Waugh Security in the App Economy How to Ride the Wave Without Wiping Out! SPO1-W02 Vice President, Security Solutions CA Technologies
  • 2. Are you rolling out new apps & services to your customers?
  • 3. Are you using security to improve customer engagement?
  • 4. Are you leveraging security to enable and drive business?
  • 5. Have you had a breach in the last year -as far as you know?
  • 6. #RSAC Today, Every Company is a Software Company. Are You? 6 From sneaker company to data enabled athletic brand. From book seller to insight driven delivery service, cloud servicer and entertainment hub. From UK Grocer to global consumer retailer leveraging data and technology that reframes the shopper experience. In 2014, CEOs must focus on leading their organizations to think like and become more like “tech” companies, because within a few years, digital business capabilities will dominate every industry. Urgent action is needed because first-mover advantage is common in digital business, and fast followers must be very fast. Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
  • 8. #RSAC#RSAC Security in the Open Enterprise
  • 10. #RSAC Security concerns the top obstacle in app economy#1 -- CA Technologies with Vanson Bourne Overall IT spend devoted to Security over next 3 years >25% Leaders saw revenue increase for security- enabled services (18% of Laggards) 47% Security priority for business is improving mobile experience #2 Increase in breaches YoY from 2013 to 2014 78% #RSAC Security
  • 11. #RSAC Application Economy Requires Identity-centric Security 11 IDENTITY - CENTRIC SECURITY Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 12. #RSAC 12 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 13. #RSAC 13 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS #RSAC
  • 14. #RSAC Simplify Anywhere, Anything Access 14 CUSTOMERS, EMPLOYEES, PARTNERS Mobile Apps APIs/Web Services Web Apps From the Cloud On-Premise On Device Enable access from any device Coordinate security across Web, mobile, APIs Improve customer adoption/experience/ loyalty What you need to do
  • 15. #RSAC The Application Economy is Driving the Rapid Adoption of Mobile Applications 15 “By 2020, more than 63% of enterprises expect their desktops to be replaced by mobile devices connected to the network via office wireless LAN” Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales, 14 May 2014 79%of organizations are using SaaS Sources: Ponemon Institute.
  • 16. #RSAC Enabling your Mobile Workforce is a Journey Web API Native AppWeb-App Existing Web Applications New Native App Projects Unified Access Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
  • 17. #RSAC IAM + API Solution Enables Fast, Secure Mobile Delivery of Enterprise Applications 17 Identity Manager Cloud Apps On-Premises Enterprise Apps CA SSO ( SiteMinder ) / LDAP / IdP CA Mobile API Gateway Paul Pronsati EVP, Global Business Ops & CIO BENEFITS  Common standard across platforms and applications  Improves developer velocity and time to value  Application user and device level security OAUTH/API SAML SAML SAML CA Mobile API Gateway CA SSO {SiteMinder} / LDAP/ldP On-Premises Enterprise Apps Identity Manager
  • 18. #RSAC Lessons in Mobility 18  Begin with the user experience as the focus. Is login required?  Review and define your architecture holistically; be prepared to move fast!  Choose the app type that fits your use case and objective and implement a solution that combines usability and security (native app SSO + web)  Leverage your existing SSO implementation to improve the experience  Engage the business now around what SaaS projects are coming up and position the enterprise friendly vendors…say “yes” to BYOA  Start thinking beyond front door access for SaaS
  • 19. #RSAC 19 What you need to be thinking about #RSAC PROTECT DATA WHILE ENABLING BUSINESS
  • 20. #RSAC Security – By the Numbers RECORDS BREACHED IN 20141,023,108,267 NUMBER OF BREACH INCIDENTS1,541 BREACHED RECORDS INCREASE FROM LAST YEAR78% Data records were lost or stolen with the following frequency Every Day 2,803,036 Every Hour 116,793 Every Minute 1,947 Every Second 32
  • 21. #RSAC Protect Data While Enabling Business 21  Device  Geolocation  Velocity  User history  Fraud patterns PROTECT MOBILE APP STRONGLY AUTHENTICATE USERS CONTROL ACCESS TO WEB APPS CONTROL ACCESS TO APIS SECURE PRIVILEGED IDENTITIES Enable security from end-to-end Protect against insider threats Defend against external threats What you need to do
  • 22. #RSAC Combat Insider Threats and External Attacks Systems Data Administrators Employees INSIDERS CUSTOMERS Web Apps Strong,Risk-based Authentication Privileged Identity SSO with Session Assurance EXTERNAL THREATS BUSINESS VALUE  Reduced risk of breach through fine-grained admin controls, hypervisor security, and shared account management.  Increase security and customer trust with strong, risk-aware authentication  Protect against session hijacking with unique session assurance PROOF POINTS  CA Privileged Identity Manager is the ONLY solution that helps secure critical systems at the OS kernel level  CA PIM is protecting the systems at 9 out of the top 16 Fortune 25 companies  CA Advanced Authentication enabled 64% of surveyed companies improve their user experience REQUIRED CAPABILITIES PIM Advanced Authentication SSO
  • 23. #RSAC Lessons in protecting your business 23  Perimeter security is necessary, but not sufficient. You need to think end-to- end and defend from the inside-out  Think about your identities. Do your accounts have the right privileges? Who certified access? Do you have orphaned accounts?  Nearly all of the most damaging attacks use a privileged identity – focus your attention here!  Don’t think of insider threats as purely malicious employees: they can be targeted with social engineering or can be careless  Additional security doesn’t have to make the user experience more difficult. Risk-awareness is essential - security gets applies only where needed
  • 24. #RSAC 24 What you need to be thinking about #RSAC EXTEND BUSINESS WITH SECURITY
  • 25. #RSAC EXTENDING BUSINESS WITH SECURITY 25 Reduce infrastructure Drive agility into the business Reduce need for security expertise What you need to do IDENTITY AS A SERVICE
  • 26. #RSAC 26 170 Countries 6,500 Corporate & public sector customers 3 million+ Direct customers #RSAC
  • 27. #RSAC 27 #RSAC FOCUS ON CORE COMPETENCY Our advice Seek security expertise BT’s approach • Ensure they have depth and breadth of experience in delivering service • Remain engaged with your partner security expert • Provide in-depth defence and incident response • Around-the-clock protection from cyber threats • Understand risks as organisation changes – when new technologies are introduced, new vulnerabilities presented • Provide secure access to all remote and mobile workers
  • 28. #RSAC Lessons in Identity & Access as a Service 28  Enable the business to outsource IT Security to managed services and focus on your true business  Become the identity provider for external as well as internal users  Secure identity and access from end to end – from the device, user, application, transmission, and though to the data source
  • 29. #RSAC 29 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 30. #RSAC Security Spend Must do More than Just Secure 30 Sell the business on business value PROTECT THE BUSINESS UNLEASH THE BUSINESS Secure access to on-premise and cloud applications Govern user access across enterprise Protect against insider threats and external attacks Accelerate the delivery of secure apps Deliver multi- channel – from Web to Mobile to APIs Enable bring your own identity Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 31. Success is the result of right choices. Choose your waves wisely. Unknown surfer, March, 2015
  • 32. #RSAC 32 This is business, rewritten by software™ #RSAC
  • 33. #RSAC Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. Thank You
  • 34. #RSAC For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page Security