IBM Mobile Security DELIVERING CONFIDENCE. Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap



Similar documents
6 Things To Think About Before Implementing BYOD

Ubiquitous Computing, Pervasive Risk: Securely Deploy and Manage Enterprise Mobile Devices

Securing the mobile enterprise with IBM Security solutions

IBM MobileFirst Launch David Lee Heyman

Managing and Securing the Mobile Device Invasion IBM Corporation

IBM QRadar Security Intelligence April 2013

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM Endpoint Manager for Mobile Devices

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

IBM MobileFirst Enabling Continuous Business Operations with Mobile (BYOD) Applications

IBM Security IBM Corporation IBM Corporation

Improve your mobile application security with IBM Worklight

Introduction to IBM Worklight Mobile Platform

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Mobile and BYOD Strategy

Addressing Security for Hybrid Cloud

Symantec Mobile Management 7.2

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Next Generation Telecom Expense Management

Symantec Mobile Management 7.1

What We Do: Simplify Enterprise Mobility

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Athena Mobile Device Management from Symantec

Introducing IBM s Advanced Threat Protection Platform

Security and Compliance challenges in Mobile environment

The flexible workplace: Unlocking value in the bring your own device era

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Symantec Mobile Management for Configuration Manager 7.2

Strengthen security with intelligent identity and access management

IBM Security Intelligence Strategy

Symantec Mobile Management 7.1

Hands on, field experiences with BYOD. BYOD Seminar

Applying System Thinking Concepts in Cyber Security Architectural Design of Enterprise Network Systems

The ForeScout Difference

If you can't beat them - secure them

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

BYOD: End-to-End Security

Ensuring the security of your mobile business intelligence

A number of factors contribute to the diminished regard for security:

Best Practices for a BYOD World

ForeScout MDM Enterprise

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

RFI Template for Enterprise MDM Solutions

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM MobileFirst Managed Mobility

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

How To Protect Your Mobile Devices From Security Threats

Authentication Strategy: Balancing Security and Convenience

Symantec Mobile Management Suite

CA Enterprise Mobility Management MSO

Tivoli Automation for Proactive Integrated Service Management

Embracing Complete BYOD Security with MDM and NAC

Cisco Mobile Collaboration Management Service

Addressing BYOD Challenges with ForeScout and Motorola Solutions

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

#ITtrends #ITTRENDS SYMANTEC VISION

Simplify security management in the cloud

IBM Security QRadar Risk Manager

Under the Hood of the IBM Threat Protection System

Kaspersky Security for Mobile

The Current State of Cyber Security

The webinar will begin shortly

Safeguarding the cloud with IBM Dynamic Cloud Security

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Securing Mobile Apps in a BYOD World

Technical Note. ForeScout MDM Data Security

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

IT Self Service and BYOD Markku A Suistola

IBM Security Privileged Identity Manager helps prevent insider threats

Security Intelligence Solutions

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Simplifying Desktop Mgmt With Novell ZENworks

Enhancing Your Mobile Enterprise Security with IBM Worklight IBM Redbooks Solution Guide

IBM Advanced Threat Protection Solution

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

and Security in the Era of Cloud

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Security strategies to stay off the Børsen front page

Preemptive security solutions for healthcare

IBM Security QRadar Risk Manager

Securing Enterprise Mobility for Greater Competitive Advantage

Transcription:

IBM Mobile Security DELIVERING CONFIDENCE Vijay Dheap Global Product Manager, IBM Mobile Security Solutions IBM Master Inventor Twitter: @dheap

It s a (Smarter) Mobile World! In 2011 sales of smartphones surpassed that of PCs, soon they will dwarf the sales of PCs - Business Insider

Mobile India 23% of Urban India population have smart phones, and 80% are first time users Based on the 2011 estimate by Census India, urban Indian population (37.7 Crore), there are more smartphone users in India than the population of Germany! (~86M > ~81M) 36% of all smartphone owners in India are in 18-29 age group the demographic dividend

Employees Bringing Smart Devices to Work By 2015 40% of Enterprise devices will be mobile devices - IBM Projection 80%of the employees from India claim that their companies permitthem to connect to the corporate network with personally owned devices and use them for work. -BT Assure-Rethink the Risk Survey Bring Your Own Device (BYOD) The trajectory of adoption is coming from the consumer space into the enterprise. Greater propensity for users of smartphones and tablets to use their personal devices for work Organizations starting to view BYOD for its business value and organizations recognizing the competitive differentiation it can offer

Mobility as an Enabler for India Inc. Business value driven by mobility applies across regions, but mobile is also opening up unique opportunities for the Indian market Increasing the Banking Population A major Indian Bank wants to educate rural communities on the benefits of banking and grow its cash reserves Hired 250,000 agents to teach and market banking products Each agent used their own personal mobile phone and the bank s mobile solution facilitated transactions, captured information for risk determination and incentivized agents Achieving Operational Excellence Inefficient workflows at a major Indian airport was raising operational costs for airlines Mobile solution to guide and monitor airport workers dramatically transformed operations leading to achieving unrealized efficiencies Exported solution to airports in other regions (i.e. China, Middle East, Europe)

Uniqueness of Mobile Mobile devices are shared more often Personal phones and tablets shared with family Enterprise tablet shared with coworkers Social norms of mobile apps vs. file systems Mobile devices have multiple personas Work tool Entertainment device Personal organiser Security profile per persona? Mobile devices are diverse. OS immaturity for enterprise mgmt BYOD dictates multiple OSs Vendor / carrier control dictates multiple OS versions Diverse app development/delivery model Mobile devices are used in more locations A single location could offer public, private, and cell connections Anywhere, anytime Increasing reliance on enterprise WiFi Devices more likely to be lost/stolen Mobile devices prioritise the user Conflicts with user experience not tolerated OS architecture puts the user in control Difficult to enforce policy, app lists Security policies have less of a chance of dictating experience

Mobile Security Risks, Concerns & Emerging Threats OWASP Mobile Security Project: Top 10 Mobile Risks, (Release Candidate v1.0) 1.Insecure Data Storage 2.Weak Server Side Controls 3.Insufficient Transport Layer Protection 4.Client Side Injection 5.Poor Authorization and Authentication 6.Improper Session Handling 7.Security Decisions Via Untrusted Inputs 8.Side Channel Data Leakage 9.Broken Cryptography 10.Sensitive Information Disclosure Social Engineering Rogue Apps Malicious Websites Emerging Mobile Threats Mobile Borne DoS Attacks Identity Theft Man-in-the-Middle Attacks

IBM Strategy Addresses Client Mobile Initiatives Extend & Transform Extendexisting business capabilities to mobile devices Transformthe business by creating new opportunities Build & Connect Build mobile applications Connectto, and runbackend systems in support of mobile Manage & Secure Manage mobile devices and applications Secure my mobile business

IBM Case Study 95% of IBM employees are issued laptops Over 100,000 smartphones and tablets with access to the IBM corporate network and growing rapidly! Personally owned devices can be used for business purposes Strong dependency on collaboration and social media tools to conduct IBM business and stay connected How did IBM become a mobile enterprise? Established policies for mobile employees Established policies for personally-owned devices Sold expensive office space and created world-wide mobility centers Launched small, focused opt-in BYOD pilots. Resisted the urge to boil the ocean Embraced collaboration and social media tools to allow mobile devices to stay connected IBM's BYOD program "really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business. IBM CIO Jeanette Horan A highly diverse workforce: 425,000 employees worldwide 50% workforce has less than 5 years of service 50% of employees work remotely not from a traditional IBM office 71% of employees are outside the US

Execute Based on Segmentation Approach Identified Personas

Cost Considerations of BYOD Roadmap for BT/IT Shared Service includes yty expense reduction while workforce grows Corporate managed program by role/segments Mobility tool for guidance and options Compliance Process & Validation (A&E) Cost management Employees can leverage IBM contracts Negotiate local geo/country contracts with global mobile carriers including ongoing service cost reductions Strict Reimbursement policy A consistent mobile rendering of IBM web applications will require some investment and re-engineering (target apps based on relevance) IBM is investing in Mobile Device Management to improve security and systems management of these mobile devices

BYOD: It s a Spectrum Organizations have to start on the BYOD journey by establishing policies that meet their current operational objectives. Policies can evolve as an organization and its employees better understand the risks as well as the benefits. BYOD programs vary across organizations, industries and regions.

Mobile Security Challenges Faced By Enterprises Achieving Data Separation & Providing Data Protection Adapting to the BYOD/ Consumerization of IT Trend Providing secure access to enterprise applications & data Personal vs corporate data Data leakage into and out of the enterprise Partial wipe vs. device wipe vs legally defensible wipe Data policies Multiple device platforms and variants Multiple providers Managed devices (B2E) Unmanaged devices (B2B,B2E, B2C) Endpoint policies Threat protection Identity of user and devices Authentication, Authorization and Federation User policies Secure Connectivity Developing Secure Applications Application life-cycle Vulnerability & Penetration testing Application Management Application policies Designing & Instituting an Adaptive Security Posture Policy Management: Location, Geo, Roles, Response, Time policies Security Intelligence Reporting

Visualizing Mobile Security WiFi Mobile apps Web sites Internet Develop, test and deliver safe applications Secure endpoint device and data Telecom Provider Achieve Visibility and Enable Adaptive Security Posture Security Gateway Corporate Intranet & Systems Secure access to enterprise applications and data

Getting Started with Mobile Security Solutions Business Need: Protect Data & Applications on the Device Prevent Loss or Leakage of Enterprise Data Wipe Local Data Encryption Protect Access to the Device Device lock Mitigate exposure to vulnerabilities Anti-malware Push updates Detect jailbreak Detect non-compliance Protect Access to Apps App disable User authentication Enforce Corporate Policies Business Need: Protect Enterprise Systems & Deliver Secure Access Provide secure access to enterprise systems VPN Prevent unauthorized access to enterprise systems Identity Certificate management Authentication Authorization Audit Protect users from Internet borne threats Threat protection Enforce Corporate Policies Anomaly Detection Security challenges for access to sensitive data Business Need: Build, Test and Run Secure Mobile Apps Enforce Corporate Development Best Practices Development tools enforcing security policies Testing mobile apps for exposure to threats Penetration Testing Vulnerability Testing Provide Offline Access Encrypted Local Storage of Credentials Deliver mobile apps securely Enterprise App Store Prevent usage of compromised apps Detect and disable compromised apps

DELIVERING CONFIDENCE 16 2012 IBM Corporation

Mobile Device Security IBM Endpoint Manager for Mobile Devices: A highly-scalable, unified solution that delivers device management and security across device types and operating systems for superior visibility and control Managed = Secure Systems management Desktop / laptop / server endpoint Common agent Unified console Common infrastructure Single server IBM Endpoint Manager Mobile endpoint Security management Purpose-specific endpoint Client Challenge Managing and securing enterprise and BYOD mobile devices without additional resources Key Capabilities A unified systems and security management solution for all enterprise devices Near-instant deployment of new features and reports in to customer s environments Platform to extend integrations with Service Desk, CMDB, SIEM, and other informationgathering systems to mobile devices Advanced mobile device management capabilities for ios, Android, Symbian, and Windows Mobile, Windows Phone Security threat detection and automated remediation

Mobile Access Security IBM Security Access Manager for Mobile: Delivers user security by authenticating and authorizing the user and their device VPN or HTTPS IBM Access Manager Access Manager Servers External Authentication Provider User registries (i.e. LDAP) Client Challenge Ensuring users and devices are authorized to access enterprise resources from that specific device. Key Capabilities Application Servers (WebSphere, WorkLight) Web Services Federated ID Mgr Web Apps Satisfy complex context-aware authentication requirements Reverse proxy, authentication, authorization, and federated identity Mobile native, hybrid, and web apps Flexibility in authentication: user id/password, basic auth, certificate, or custom Supports open standards applicable to mobile such as OAuth Advanced Session Management

Mobile Access Security IBM Lotus Mobile Connect:Provides features that help deliver a security-rich connection to enterprise resources from mobile devices. Client Challenge Need to protect enterprise data in transit from mobile devices to back-end systems Key Capabilities Clientless app-level Virtual Public Network (VPN) with a SSL-secured tunnel to specific HTTP application servers Strong authentication and encryptionof data in transit

Mobile App Security AppScan: app security testing and risk management Client Challenge Applying patches and resolving application vulnerabilities after apps are Delivered and Deployed is a very costly and time consuming exercise Key Capabilities Leverage AppScan for vulnerability testing of mobile web apps, web elements (JavaScript, HTML5) of hybrid mobile apps and Android apps Vulnerabilities and coding errors can be addressed in software development and testing Code vulnerable to known threat models can be identified in testing Security designed in vs. bolted on

Mobile App Security WorkLight: Develop, deliver and deploy security-rich mobile apps to streamline business activities while also delivering a rich user experience Client Challenge Efficiently and securely, create and run HTML5, hybrid and native mobile apps for a broad set of mobile devices Key Capabilities Integrated secure access to backend application resources Secured by design -develop secure mobile apps using corporate best practices, code obfuscation Protect mobile app data with encrypted local storage for data, offline user access, app authenticity validation, and enforcement of organizational security policies Maximize mobile app performance with analytics, remote disabling of apps

Mobile Security Intelligence Qradar: Deliver mobile security intelligence by monitoring data collected from other mobile security solutions visibility, reporting and threat detection Client Challenge Visibility of security events across the enterprise, to stay ahead of the threat, show compliance and reduce enterprise risk Key Capabilities Integrated intelligent actionable platform for Searching Filtering Rule writing Reporting functions A single user interface for Log management Risk modeling Vulnerability prioritization Incident detection Impact analysis tasks

Securing the Mobile Enterprise with IBM Solutions

Managing BYOD Costs Emptoris Rivermine Telecom Expense Management:Manage, track and optimize mobile spend while ensuring policies are enforced Client Challenge Managing rapid proliferation of corporate and BYOD mobile devices to rein in costs and enforce policy compliance Key Capabilities Streamline mobile usage management with end-user portal Identify most cost effective rate plan for users with rate plan optimization and auditing Accelerate device issue resolution and corporate mobile policy enforcement Ensure bill accuracy and prevent overpayments with invoice processing Optimize contract costs, terms and conditions Personal vs. Business Call Tagging for tax legislation compliance Mobile Device Recycling for environmental compliance and possible rebates

CUSTOMER CASE STUDIES 25 2012 IBM Corporation

IBM Case Study Extending Corporate Access IBM's BYOD program really is about supporting employees in the way they want to work. They will find the most appropriate tool to get their job done. I want to make sure I can enable them to do that, but in a way that safeguards the integrity of our business. Jeanette Horan, IBM CIO Customer Needs Support BYOD for a variety of mobile platforms securely for a highly mobile population Scale to hundreds of thousands of devices Key Features & Outcomes 120,000 mobile devices, 80,000 personally owned, supported in months Integrated Lotus Traveler, IBM Connections, IBM Sametime, and IBM Endpoint Manager

Leading European Bank European Bank to Deliver Secure Mobile Internet Banking AimArs needed to reduce operational complexity and cost with a single, scalable infrastructure to secure access to various back-end services from multiple mobile apps. A customized authentication mechanism empowered the bank to guarantee the security of its customers while safeguarding the trust relationship with a safe app platform that encrypts local data and delivers app updates immediately. Customer Needs Extend secure access to banking apps to mobile customers Enhance productivity of employees to perform secure banking transactions via mobile devices Support for ios, Android, and Windows Mobile Key Features & Outcomes Authenticates requests made via HTTPS from hybrid mobile apps running on WorkLight platform to back-end services A custom certificates-based authentication mechanism implemented to secure back-end banking application

Major Utility Company Adding Mobile Devices Without Adding Infrastructure Serving 4.5 million customers in the southwestern region of the United States, this electric company of 25,000 employees is a leader inclean energy while exceeding reliability standards and keeping consumer costs below average. They are experiencing a migration from traditional endpoints to mobile devices. Customer Needs Support 20,000+ mobile devices Corporate and employee-owned, many platforms and OS versions High availability for certain devices used in the field Adherence to Internal security policies, external regulations Key Features & Outcomes Scalability to 250,000 endpoints provides room to grow Added mobile devices to existing IEM deployment in days Ability to integrate with Maximo, Remedy Responsiveness and agility of product and product team

Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.