IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "IBM MOBILE SECURITY SOLUTIONS - Identity and Access Management Focus"

Transcription

1 IBM MOBILE SECURITY SOLUTIONS - Identity and Access Focus May 2012

2 Executive Overview Mobile devices are pervasive in our daily lives and increasingly coming to work Bring Your Own Device (BYOD) IBM is helping CISOs manage the risks associated with mobility IBM Mobile Security Solutions are helping customers address their challenges across the board Security Intelligence People Data Applications Infrastructure 5.6 Billion connections growing to 7.4 by Gartner Mobile Security is a natural extension to our security portfolio Mobile devices are simply another enterprise endpoint to be managed, secured, audited... 2

3 Challenges of Enterprise Mobility Adapting to the Bring Your Own Device (BYOD) to Work Trend - Device and Security - Application management Achieving Data Separation - Privacy - Corporate Data protection Providing secure access to enterprise applications & data - Secure connectivity - Identity, Access and Authorization Developing Secure Mobile Apps - Vulnerability testing Designing an Adaptive Security Posture - Policy - Security Intelligence 3

4 Mobile Security Enabled with IBM Solutions IBM can bring together a broad portfolio of technologies and services to meet the mobile security needs of customers across multiple industries Enterprise Analytics and Compliance Mobile Identity and Access Mobile Network Protection Mobile Device Mobile Device Security Firewall Network IPS System IPS Virtual IPS Mobile Information Protection Mobile Threat Secure Mobile Application Development 4

5 Enterprise Use Case Pattern: Security from Devices to Mobile Apps WiFi Internet Mobile apps Web sites Develop, test and deliver safe applications Secure endpoint device and data Telecom Provider Achieve Visibility and Enable Adaptive Security Posture Security Gateway Corporate Intranet & Systems Secure access to enterprise applications and data 5

6 Mobile Information Protection Secure Mobile Application Development Application Security Solution: WorkLight Security by Design Develop secure mobile apps using corporate best practices Code obfuscation Application Security Objectives Protecting Mobile App Data Encrypted local storage for data, Offline user access Challenge response on startup App Authenticity Validation Enforcement of organizational security policies Enforcing Security Compliance Direct Updates Integration with User Security Solutions App Analytics Remote Disabling of apps Streamline Corporate security approval processes Protect Local Application Data Integrate with User Security Solutions Proactively Enforce Security Updates Integration point with IBM Tivoli Access Manager (TAMeb) Protect From Known Application Security Threats 6

7 Mobile Identity and Access User Security Solution: IBM Security Access Manager for Mobile (actual product name: Tivoli Access Manager for e-business - TAMeb) Delivers user security by authenticating and authorizing the user along with their device. Supports open standards applicable to mobile such as OAuth IBM Access Manager Access Manager Servers (e.g., Policy) User registries (i.e. LDAP) VPN or HTTPS Authentication many options Coarse-grained authorization Session management Auditing/ reporting Linkage to QRadar SIEM (Security Intelligence) External Authentication Provider Application Servers (i.e. WebSphere, WorkLight) Federated Identity Manager 7 Mobile Browser or Native Applications Web Services Web Applications Enterprise

8 Mobile Identity and Access TAMeb Support for Mobile Applications How are apps on different phone platforms supported? Mobile apps are written in different languages depending on the phone platform Objective C for ios Java for Android C# for Windows Mobile apps use HTTP libraries from the browser engine (Webkit) on mobile phones to make HTTP 1.1 calls out 4Q TAMeb states support for HTTP 1.1 TAMeb support will work with browsers on ios, Android, Symbian and Windows Phones 8

9 Mobile Identity and Access European Bank Aims to Deliver Secure Mobile Internet Banking Customer Objectives Give mobile customers secure access to banking applications Enable employees to perform secure banking transactions via mobile devices Target Mobile Platforms ios (ipad/iphone) Android Windows Mobile (future) IBM Security Solution IBM s Access Manager and WorkLight solutions provide security services - Access Manager authenticates (certificate-based) - Mobile apps run on WorkLight platform - Result: secure access to back-end banking applications Business Value Reduce operational complexity and cost with a single, scalable infrastructure to secure access to various back-end services from multiple mobile applications Customizability of authentication mechanism empowers the bank to guarantee the security of its customers Safeguard trust relationship between the bank and its customers using a safe app platform that encrypts local data and delivers app updates immediately once they are available 9

10 Mobile Identity and Access Architectural View of the Solution Being Deployed at the Bank IBM Security Solution User Security coupled with Application Security IBM Access Manager for e-business serves as a Reverse Proxy and provides Web Access (WAM) for WorkLight Server WorkLight server interfaces with banking services to deliver the data to authorized mobile users of the bank s mobile app WorkLight shell for the mobile app provides encrypted cache for app data 10

11 Secure Mobile Application Development Application Security Solution: AppScan 80% of development costs are spent identifying and correcting defects! Average Cost of a Data Breach $7.2M from law suits, loss of customer trust, damage to brand Find during Development $80/defect Find during Build $240/defect Find during QA/Test $960/defect Find in Production $7,600 / defect AppScan Source AppScan Standard / Enterprise 11 Static Application Security Testing White box Ounce Labs Dynamic Application Security Testing Black box Watchfire

12 Mobile Device Mobile Device Security Device Security Solution: IBM Endpoint Manager For Mobile Delivers device security by providing visibility of the devices connected to the enterprise, and supports core capabilities such as device lock, selective wipe and jailbreak detection. Traditional Endpoint Mobile Device OS provisioning Patching Power Mgmt Anti-Virus Mgmt Device inventory Security policy mgmt Application mgmt Device config (VPN/ /Wifi) Encryption mgmt Roaming device support Integration with internal systems Scalable/Secure solution Easy-to-deploy Multiple OS support Consolidated infrastructure Device Wipe Location info Jailbreak/Root detection Enterprise App store Self-service portal ios, Android, Symbian, and Windows Phones 12

13 Enterprise Analytics and Compliance Mobile Security Intelligence: QRadar Delivers Mobile Security Intelligence by monitoring data collected from other mobile security solutions visibility, reporting and threat detection Ingest log data and events from: Endpoint Manager for Mobile Devices Access Manager Mobile Connect WorkLight 1B+ Events per Day High Priority Offenses Unified collection, aggregation and analysis Common SIEM search, filtering, rule writing and reporting platform Single user interface for Log management Risk modeling Vulnerability prioritization Incident detection Impact analysis 13

14 External Resources IBM Mobile Security Website: IBM Mobile Security Video: Whitepaper: Securing mobile devices in the business environment - https://www14.software.ibm.com/webapp/iwm/web/signup.do?source=swapp&s_pkg=mobile_secure_device&s_tact=109ka5tw&s_cmp=web_ibm_xx_mobil e_rn_mobilesecurity Podcast: Enterprise mobile management and security - Blogs: Exploiting Innovation with Confidence - 14

15 Summary Mobile Security is not one off Mobile Security is not ad hoc Mobile Security is being delivered by IBM today through a combination of: Existing security capability that is applicable to all clients, including mobile clients Solutions that deliver security that is unique to mobile configurations 15

16 16

17 Legal Disclaimer IBM Corporation All Rights Reserved. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus Sametime Unyte ). Subsequent references can drop IBM but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to for guidance on which trademarks require the or symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. If you reference Adobe in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. If you reference Java in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. If you reference Microsoft and/or Windows in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. If you reference Intel and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. If you reference UNIX in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. If you reference Linux in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only. 17

18 Driving Key Set of Mobile Security Requirements Mobile devices are not only computing platforms but also communication devices, hence mobile security is multi-faceted, driven by customers operational priorities Mobile Security Intelligence Mobile Device Data, Network and Access Security App/Test Development Mobile Device Acquire/Deploy Register Activation Content Mgmt Manage/Monitor Self Service Reporting Retire De-provision Mobile Device Security Device wipe and lockdown Password Configuration Policy Compliance Mobile Threat Anti-malware Anti-spyware Anti-spam Firewall/IPS Web filtering Web Reputation Mobile Information Protection Data encryption (device, file and app) Mobile data loss prevention Mobile Network Protection Secure Communications (VPN) Edge Protection Mobile Identity and Access Identity Authorize & Authenticate Certificate Multi-factor Secure Mobile Application Development Vulnerability testing Mobile app testing Enforced by tools Enterprise policies Mobile Applications i.e. Native, Hybrid, Web Application Mobile Application Platforms and Containers Device Platforms 30 device Manufacturers, 10 operating platforms i.e. ios, Android, Windows Mobile, Symbian, etc. 18

19 Mobile Network Protection Solution: IBM Mobile Connect Delivers secure connectivity from mobile devices to back-end systems and adapts to a mobile user's unique requirements such as roaming support and cost-based routing A high availability intelligent solution providing: Mobile VPN SSL VPN Least cost routing & data optimization 19 End-to-end encryption

20 A Review of IBM s Single Sign-On Coverage FIM Web Services Federated Internet-B2C Extranet-B2E SAM E-SSO Intranet/Kiosk 20 AMeb SAM E-SSO Web Workplace Web SSO Targets Non-Web Targets URL SOA Web Servers Web Applications Portals, e.g. WPS Windows Java Citrix/ Term. Svcs. Mainframe

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices S. Rohit rohits@sg.ibm.com Trends in Enterprise Mobility The need for business agility along with changing employee

More information

IBM Software Services for Collaboration

IBM Software Services for Collaboration An introduction to: IBM Collaboration Services for ProjExec ProjExec is easy to use professional project management software that is combined with innovative social features to provide project teams a

More information

Mobile Application Development Track Keynote. Leigh Williamson, IBM Distinguished Engineer IBM Software Group, Rational CTO Team

Mobile Application Development Track Keynote. Leigh Williamson, IBM Distinguished Engineer IBM Software Group, Rational CTO Team Mobile Application Development Track Keynote Leigh Williamson, IBM Distinguished Engineer IBM Software Group, Rational CTO Team The Mobile Shift is what happens when people adopt and use mobile devices

More information

Why Finance Should Automate Management & Regulatory Reporting Processes

Why Finance Should Automate Management & Regulatory Reporting Processes May 25, 2016 Why Finance Should Automate Management & Regulatory Reporting Processes connecting senior-level financial executives since 1931 CPE Credits Today s webcast is worth 1 Continuing Professional

More information

IBM Digital Experience meets IBM WebSphere Commerce

IBM Digital Experience meets IBM WebSphere Commerce Portal Arbeitskreis - 27.10.2014 IBM Digital Experience meets IBM WebSphere Commerce Stefan Koch Chief Programmer IBM Digital Experience 2013 IBM Corporation 2 2013 IBM Corporation Integration Pattern

More information

The predictive power of Big Data in healthcare

The predictive power of Big Data in healthcare Charlie Schick, PhD Big Data, Healthcare and Life Sciences The predictive power of Big Data in healthcare 2012 IBM Corporation Market Forces Driving Health Care Transformation Increasing incidence and

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

SAML and OAUTH Technologies WebSphere Application Server

SAML and OAUTH Technologies WebSphere Application Server SAML and OAUTH Technologies WebSphere Application Server Bill O'Donnell STSM WebSphere Foundation Security Architect Session TAW-1701 Session TAW-1698 Please Note IBM s statements regarding its plans,

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Using computing resources with IBM ILOG CPLEX CO@W2015

Using computing resources with IBM ILOG CPLEX CO@W2015 CPLEX Optimization IBM Germany 2015-10-06 Using computing resources with IBM ILOG CPLEX CO@W2015 Hardware resources Multiple cores/threads Multiple machines No machines Software resources Interfacing with

More information

A Strategic Guide to Enterprise Mobility

A Strategic Guide to Enterprise Mobility A Strategic Guide to Enterprise Mobility Dirk Nicol Director Practitioner Outreach and Mobile Developer Community IBM 2013 IBM Corporation Introducing the Mobile Enterprise The next era of computing Builds

More information

IBM MobileFirst Analytics: Discover what s working, what s not, and why

IBM MobileFirst Analytics: Discover what s working, what s not, and why IBM MobileFirst Analytics: Discover what s working, what s not, and why Rüdiger Reh, Senior Solution Consultant Tealeaf, D/A/CH, IBM IBM MobileFirst Offering Portfolio Industry Solutions Banking Insurance

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1

Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory. 2012 IBM Corporation 1 Developing Exceptional Mobile and Multi-Channel Applications using IBM Web Experience Factory 1 Agenda Mobile web applications and Web Experience Factory High-level tour of Web Experience Factory automation

More information

The Vision of modern (Cloud) Computing within Financial Services Business

The Vision of modern (Cloud) Computing within Financial Services Business The Vision of modern (Cloud) Computing within Financial Services Business Michael Schüttler (MBA) - Leader Cloud Solution Sales The reality of living in a globally integrated world is upon us Economic

More information

Big Data: Modern Ecosystems for Data Warehousing and Analytics. James Kobielus IBM Big Data Evangelist. 2014 IBM Corporation

Big Data: Modern Ecosystems for Data Warehousing and Analytics. James Kobielus IBM Big Data Evangelist. 2014 IBM Corporation Big Data: Modern Ecosystems for Data Warehousing and Analytics James Kobielus IBM Big Data Evangelist Insight-driven Client-centric Four Technologies Help Define the Smarter All Enterprise Embracing Data

More information

Tivoli Automation for Proactive Integrated Service Management

Tivoli Automation for Proactive Integrated Service Management Tivoli Automation for Proactive Integrated Service Management Gain advantage with Tivoli Automation portfolio Optimizing the World s Infrastructure 24 October 2012, Moscow 2012 IBM Corporation Acknowledgements,

More information

Driving Innovation and Results-Based Government with Smarter Analytics. 2012 IBM Corporation

Driving Innovation and Results-Based Government with Smarter Analytics. 2012 IBM Corporation Driving Innovation and Results-Based Government with Smarter Analytics Today, we see analytics moving from advancing single organizations i to transforming entire industries Government is no exception

More information

Security Reference Architecture

Security Reference Architecture Security Reference Architecture James (Jimmy) Darwin James.Darwin@au.ibm.com 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified

More information

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group

Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Maximo Business Intelligence Reporting Roadmap Washington DC Users Group Pam Denny, IBM Email: pdenny@us.ibm.com Twitter: andbflo_denny May 2014 Please note IBM s statements regarding its plans, directions,

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Lawson M3 7.1 on IBM POWER 520 and IBM i V6.1

Lawson M3 7.1 on IBM POWER 520 and IBM i V6.1 Lawson M3 7.1 on IBM POWER 520 and IBM i V6.1 IBM Systems & Technology Group Paul Swenson paulswen@us.ibm.com This document can be found on the web, Version Date: April 28, 2009 Statement of Approval...

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

IBM Worklight: Responsive Design for Mul8- Channel Applica8on Development

IBM Worklight: Responsive Design for Mul8- Channel Applica8on Development IBM Worklight: Responsive Design for Mul8- Channel Applica8on Development Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at

More information

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer

More information

Security Intelligence Solutions

Security Intelligence Solutions Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security

More information

How to Deliver Measurable Business Value with the Enterprise CMDB

How to Deliver Measurable Business Value with the Enterprise CMDB How to Deliver Measurable Business Value with the Enterprise CMDB James Moore jdmoore@us.ibm.com Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB

More information

Introduction to IBM Worklight Mobile Platform

Introduction to IBM Worklight Mobile Platform Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

6 Things To Think About Before Implementing BYOD

6 Things To Think About Before Implementing BYOD 6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

Performance Management for Power Systems

Performance Management for Power Systems Performance Management for Power Systems Philippe Joudrain; IBM senior IT specialist. Historique, PM400 dans les années 90 Utilité Côté client, la collecte des données de performance Transmission des données

More information

IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap

IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap IBM Mobile Security DELIVERING CONFIDENCE Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap It s a (Smarter) Mobile World! In 2011 sales of smartphones

More information

Reinventing business operations with Smarter Process

Reinventing business operations with Smarter Process Reinventing business operations with Smarter Process Dr. Stefan Kollakowski IBM Partner & Leader Smarter Process DACH BPM ist mehr als eine Technologie - BPM ist ein Managementkonzept zur prozessorientierten

More information

Title. Click to edit Master text styles Second level Third level

Title. Click to edit Master text styles Second level Third level Title Click to edit Master text styles Second level Third level IBM s Vision For The New Enterprise Data Center Subram Natarajan Senior Consultant, STG Asia Pacific subram.natarajan@in.ibm.com Multiple

More information

Security of Cloud Computing for the Power Grid

Security of Cloud Computing for the Power Grid ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY

More information

IBM MQ Disaster Recovery

IBM MQ Disaster Recovery IBM MQ Disaster Recovery Mark Taylor marke_taylor@uk.ibm.com IBM Hursley Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

Oleksandr Romanko, Ph.D. Senior Research Analyst, Risk Analytics Business Analytics, IBM Canada October 8, 2013. Business Analytics and Optimization

Oleksandr Romanko, Ph.D. Senior Research Analyst, Risk Analytics Business Analytics, IBM Canada October 8, 2013. Business Analytics and Optimization Oleksandr Romanko, Ph.D. Senior Research Analyst, Risk Analytics Business Analytics, IBM Canada October 8, 2013 Business Analytics and Optimization Please note: IBM Risk Analytics statements regarding

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Gain a competitive edge through optimized B2B file transfer

Gain a competitive edge through optimized B2B file transfer Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

Cloud Computing with xcat on z/vm 6.3

Cloud Computing with xcat on z/vm 6.3 IBM System z Cloud Computing with xcat on z/vm 6.3 Thang Pham z/vm Development Lab thang.pham@us.ibm.com Trademarks The following are trademarks of the International Business Machines Corporation in the

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

IBM Security Access Manager for Web

IBM Security Access Manager for Web IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and

More information

Is a GIS platform good enough for end-to-end Enterprise Asset Managem ent?

Is a GIS platform good enough for end-to-end Enterprise Asset Managem ent? Tivoli/Maximo Is a GIS platform good enough for end-to-end Enterprise Asset Managem ent? Bartosz Soroczyński Sales Executive Worldwide Service Management Tiger Team Bartosz Soroczyński IBM, Sales Executive,

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Private Geräte im Unternehmen - ein großes Potential mit Risiken

Private Geräte im Unternehmen - ein großes Potential mit Risiken Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private

More information

Session Title: Cloud Computing 101 What every z Person must know

Session Title: Cloud Computing 101 What every z Person must know 2009 System z Expo October 5 9, 2009 Orlando, FL Session Title: Cloud Computing 101 What every z Person must know Session ID: ZDI08 Frank J. De Gilio - degilio@us.ibm.com 2 3 View of Cloud Computing Application

More information

Securing the mobile enterprise with IBM Security solutions

Securing the mobile enterprise with IBM Security solutions Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Mobile - and its effect on the enterprise

Mobile - and its effect on the enterprise Greg Truty Distinguished Engineer, Chief Architect IBM Mobile Foundation gtruty@us.ibm.com Mobile - and its effect on the enterprise IBM Mobile Labs Come to You Mobile is changing conventions for industries

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Energy Management in a Cloud Computing Environment

Energy Management in a Cloud Computing Environment Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions

More information

Energy Management in a Cloud Computing Environment

Energy Management in a Cloud Computing Environment Hans-Dieter Wehle, IBM Distinguished IT Specialist Virtualization and Green IT Energy Management in a Cloud Computing Environment Smarter Data Center Agenda Green IT Overview Energy Management Solutions

More information

NM&MS: Bringing Ship-to-shore

NM&MS: Bringing Ship-to-shore : Bringing Ship-to-shore Network Monitoring & Management to the Royal Australian Navy About the Customer Royal Australian Navy Fleet IT Systems Support Organisation (FISSO) Fleet of 56 ships and shore

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Endpoint Manager for Mobile Devices Setup Guide

Endpoint Manager for Mobile Devices Setup Guide Endpoint Manager for Mobile Devices Setup Guide ii Endpoint Manager for Mobile Devices Setup Guide Contents Endpoint Manager for Mobile Devices Setup Guide............. 1 Components.............. 1 Architecture..............

More information

Web servers and WebSphere Portal

Web servers and WebSphere Portal Web servers and WebSphere Portal By default IBM WebSphere Portal uses the internal HTTP transport within IBM WebSphere Application Server to handle requests. However, because WebSphere Application Server

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide

Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide IBM Worklight mobile application platform helps organizations develop, deploy, host, and manage mobile enterprise

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Three significant risks of FTP use and how to overcome them

Three significant risks of FTP use and how to overcome them Three significant risks of FTP use and how to overcome them Management, security and automation Contents: 1 Make sure your file transfer infrastructure keeps pace with your business strategy 1 The nature

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

Experience messaging and collaboration in a whole new way with IBM

Experience messaging and collaboration in a whole new way with IBM Enhance productivity with world-class messaging and collaboration client software IBM Lotus Notes 7 Highlights Experience messaging and collaboration in a whole new way with IBM and formulas from running

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

IBM Maximo Asset Management Essentials

IBM Maximo Asset Management Essentials Enterprise asset capabilities for small and midsized organizations IBM Maximo Asset Essentials Highlights Leverage enterprise asset capabilities in a package specifically designed for small and midsized

More information

inotes Setup, Configuration & Troubleshooting

inotes Setup, Configuration & Troubleshooting inotes Setup, Configuration & Troubleshooting Lotus inotes Development / Support Team June 19, 2012 2012 IBM Corporation Open Mic Webcast: inotes Setup, Configuration & Troubleshooting Participant Passcode:

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

Lotus Sametime. FIPS Support for IBM Lotus Sametime 8.0. Version 8.0 SC23-8760-00

Lotus Sametime. FIPS Support for IBM Lotus Sametime 8.0. Version 8.0 SC23-8760-00 Lotus Sametime Version 8.0 FIPS Support for IBM Lotus Sametime 8.0 SC23-8760-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

The Consolidation Process

The Consolidation Process The Consolidation Process an overview Washington System Center IBM US Gaithersburg SIG User Group April 2009 Trademarks The following are trademarks of the International Business Machines Corporation in

More information

MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES

MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES BY 2015 IT IS EXPECTED THAT THE WORLD S MOBILE WORKER POPULATION WITH REACH 1.3 BILLION OR 37.2% OF THE TOTAL GLOBAL WORKFORCE. (IDC

More information

Deploying a private database cloud on z Systems

Deploying a private database cloud on z Systems Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks

More information

Practical Web Services for RPG IBM Integrated Web services for i

Practical Web Services for RPG IBM Integrated Web services for i Agenda Key: Session Number: 32CG 540191 Practical Web Services for RPG IBM Integrated Web services for i Dan Hiebert IBM dhiebert@us.ibm.com 8 Copyright IBM Corporation, 2009. All Rights Reserved. This

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:

More information