Powering Security and Easy Authentication in a Multi-Channel World



Similar documents
Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Addressing Security for Hybrid Cloud

IBM Advanced Threat Protection Solution

IBM QRadar Security Intelligence April 2013

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

Security of Cloud Computing for the Power Grid

Security Intelligence Solutions

Technology and Trends for Smarter Business Analytics

Strengthen security with intelligent identity and access management

Introducing IBM s Advanced Threat Protection Platform

Role of Multi-biometrics in Usable Multi- Factor Authentication

Security Intelligence

IBM Security IBM Corporation IBM Corporation

The Current State of Cyber Security

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Security strategies to stay off the Børsen front page

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

The Benefits of an Integrated Approach to Security in the Cloud

and Security in the Era of Cloud

CA Arcot RiskFort. Overview. Benefits

<Insert Picture Here> Oracle Identity And Access Management

Securing the mobile enterprise with IBM Security solutions

Safeguarding the cloud with IBM Dynamic Cloud Security

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

How to Choose the Right Security Information and Event Management (SIEM) Solution

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

How To Buy Nitro Security

IBM Security Intelligence Strategy

IBM Security Privileged Identity Manager helps prevent insider threats

What is Security Intelligence?

Authentication Strategy: Balancing Security and Convenience

Q1 Labs Corporate Overview

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

IBM Tivoli Federated Identity Manager

expanding web single sign-on to cloud and mobile environments agility made possible

IBM Security QRadar Risk Manager

The webinar will begin shortly

Closing the Biggest Security Hole in Web Application Delivery

IBM Security QRadar Risk Manager

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

IBM Security X-Force Threat Intelligence

HOL9449 Access Management: Secure web, mobile and cloud access

CA SiteMinder SSO Agents for ERP Systems

ACI SELF-SERVICE BANKING

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Two-Factor Authentication

How To Comply With Ffiec

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Consolidated security management for mainframe clouds

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

Tivoli Automation for Proactive Integrated Service Management

Security for a Smarter Planet IBM Corporation All Rights Reserved.

IBM Security Framework

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

IBM WebSphere Application Server

Entrust IdentityGuard

Stay ahead of insiderthreats with predictive,intelligent security

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

WHITE PAPER Usher Mobile Identity Platform

Protecting against cyber threats and security breaches

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

People-Focused Access Management. Software Consulting Support Services

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Under the Hood of the IBM Threat Protection System

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

IBM & Security Gov. Point Of Views

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Solving the Security Puzzle

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

PULSE SECURE FOR GOOGLE ANDROID

Ten questions to ask when evaluating contract management solutions

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Usable Multi-Factor Authentication and Risk- Based Authorization

RSA Identity and Access Management 2014

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

IBM Sterling Order Management

Scalability in Log Management

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Securing mobile devices in the business environment

Transcription:

Powering Security and Easy Authentication in a Multi-Channel World Archit Lohokare Global Product Manager IBM Security Systems 1 2012 IBM Corporation

IBM Security Systems division is one of the largest security software focused vendors in the world Only vendor in the market with end-to-end coverage of the security foundation $1.8B investment in innovative technologies 6K+ security engineers and consultants Award-winning X-Force research Largest vulnerability database in the industry Intelligence Integration Expertise 2 IBM is ranked #1 by IDC in Identity and Access Management (IAM) and Security & Vulnerability Management (SVM)

New Technologies è Multi-Perimeter World 1 trillion connected objects 1 billion mobile workers Social business Bring your own IT 3 Cloud and virtualization

Solving security issues is a complex, four-dimensional puzzle People Employees Hackers Outsourcers Suppliers Consultants Terrorists Customers Data Structured Unstructured At rest In motion Applications Systems applications Applications Web Applications Web 2.0 Mobile Applications Mobile apps Infrastructure Attempting to protect the perimeter is not enough siloed point products and traditional defenses cannot adequately secure the enterprise JK 2012-04-26 4

We see three prominent cloud security scenarios to help customers Security from the Cloud Security for the Cloud 1 2 Security as-a Service Public Cloud Use cloud to deliver security as-a-service - focusing on services such as vulnerability scanning, web and email security, etc. Secure usage of Public Cloud applications focusing on Audit, Access and Secure Connectivity Securing the Private Cloud stack focusing on building security into the cloud infrastructure and its workloads 3 Private Cloud 5

The IBM Mobile Security Strategy secures the path that data travels through 6

IAM continues to be key part of next wave of security technology innovation Advanced Analytics Sophisticated, targeted attacks designed to gain continuous access to critical information are increasing in severity and occurrence Cloud Computing Cloud security is a key concern as customers rethink how IT resources are designed, deployed and consumed Advanced Persistent Threats Stealth Bots Targeted Attacks Designer Malware Zero-days Mobile Computing Securing employee-owned devices and connectivity to corporate applications are top of mind as CIOs broaden support for mobility Identity & Access Management Enterprise Customers Regulation and Compliance Regulatory and compliance pressures are mounting as companies store more data and can become susceptible to audit failures GLBA 7

IBM Next Generation Identity and Access Management Strategy Key Themes 8 Standardized IAM and Compliance Management Expand IAM vertically to provide identity and access intelligence to the business; Integrate horizontally to enforce user access to data, app, and infrastructure Secure Cloud, Mobile, Social Interaction Enhance context-based access control for cloud, mobile and SaaS access, as well as integration with proofing, validation and authentication solutions Insider Threat and IAM Governance Continue to develop Privileged Identity Management (PIM) capabilities and enhanced Identity and Role management

Secure user access with IBM s Next Generation Access Management IBM Security Access Manager for Web User access + integrated web content protection New Hardware Appliance (Access Manager Proxy) Highly scalable web access management Lower TCO and easy to deploy 3 rd party integration Web Access & Application Protection (software, virtual, HW appliance) IBM Security Access Manager for Cloud & Mobile* Federation and built-in Risk-based Access control Ease of SaaS / Cloud SSO with out-of-box Integration Entitlement management with risk-based access policy support and new policy simulator for ease of deployment Federated, Risk-based Access * Marketing bundle of Federated Identity Manager and Security Policy Manager 9 IBM 9 NDA Only Pending Launch

Smartphones: Extremely Rich in Channels and Modalities that can be leveraged to improve users assurance Accelerometer Fingerprint NFC Temperature Sensor Multi-touch sensitive display High res display Cameras Pointing devices Voice Soft keyboard SMS/Text Gyro GPS Web access Bluetooth Wi-fi/WiMax Cell towers 10 10

Build secure access into the DNA of native and hybrid mobile apps Secure device registration and fingerprinting using OAuth 2.0 for IBM Worklight Applications Reduce risk of mobile app fraud using Risk-based Access Increased security and flexibility for mobile app authentication with built-in OTP and Google Authenticator support 11

Context-aware access to secure mobile user access can be strengthened by Voice Biometrics 1 Corporate Network User accesses confidential data from inside the corporate network ISAM for Cloud & Mobile* (FIM BG, SPM) SSO Enterprise Applications/Data 2 User is only asked for Userid and Password to authenticate Audit Log 3 User accesses confidential data from outside the corporate network 4 User is asked for Userid /Password and OTP/Voice based on risk score Outside the Corporate Network Risk-based Access feature to determine and score risk levels using user attributes and real-time context (e.g. location, device) Enforce mobile user access based on risk-level (e.g. permit, deny, step-up authenticate) 12 Support mobile authentication with built-in One-Time Password (OTP) and provide ability to integrate with 3 rd party strong authentication vendors, as needed

A Few Key Scenarios 13

Phone Channel / Scenario 1: Automated User Authentication and Authorization User calls a VRU self service application, or calls a call center and goes through the automated system Value add of using CB: Faster user authentication of true users Higher fraud detection rate Ability to authenticate and authorize simultaneously Authentication / authorization CB Self Service / Call Center 14 14

Phone Channel / Scenario 2: Offline fraud detection - Detecting repeating fraudsters Fraud Detection system (rule based, neural, etc.) Detected fraudulent accounts Voice Logger Call Center database Audio Fraud alert Call Center / Self Service SIV Scoring SIV Enrollment Past Fraudsters Voiceprints 15 15

ibm.com/security Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the 16 United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Internet Channel: Data, VoIP and Callback Scenarios Voice Data VoIP Internet Self Service/ CB Authentication Voice Channel (callback) Appropriate CB policy can also handle No-Voice (Data-Only) authentication 17

Scenario 1: One-time registration with OAuth OAuth-enabled Worklight banking application. User credentials are not entered or stored on the device. User is not required to authenticate each time the application opens. Revocation is possible on a application and per-device basis. Before U/P every application launch One-time registration code After Identity-aware application launch 18

Scenario 2: Risk-based access policy and strong authentication Transactions < $100 are allowed with no additional authentication User attempts transfer of amount >= $100 requires strong authentication User attempts high-value transaction Strong authentication challenge Transaction completes 19