Re-imagine i Enterprise Mobility and Security in the Era of Cloud Brendan Hannigan General Manager, IBM Security Systems
Leverage Cloud as a growth engine for business Exploit Mobile to build customer and employee engagement 91 % Of net new software in 2014 is built for cloud delivery 84 % Of CIOs rate mobility solutions as a critical area for investment to get closer to customers 2
Business Process as a Service Software as a Service Platform as a Service Infrastructure as a Service IBM Cloud Solutions Smarter Smarter Commerce Workforce Bluemix TM Big Data & Analytics Watson Solutions On Premises Cloud Infrastructure Smarter Cities Software Solutions GBS Cloud Business Solutions Cloud Managed Services Infrastructure Services 3
Build Protect Engage Transform IBM Mobile Capabilities Mobile App Development Platform Cloud Services Development and Integration Services Enterprise Mobility Management Software and Services Mobile Analytics Software Strategy and Design Services Strategy and Design Services Infrastructure Consulting Services 4
Yesterday s security does not work 5
Sophisticated attackers break through safeguards every day 2011 Year of the breach 2012 40% increase 2013 500,000,000+ records breached Attack types SQL injection Spear phishing DDoS Third-party software Physical access Malware XSS Watering hole Undisclosed $3.5M 61 % of organizations say 3.5M+ data theft and cybercrime average cost are their greatest threats of a data breach 6 IBM X-Force Threat Intelligence Quarterly 1Q 2014, circle size estimates relative cost to business 2012 IBM Global Reputational Risk & IT Study 2014 Cost of Data Breach, Ponemon Institute
85 security tools from 45 vendors IBM client example IBM client example 7
Cloud and mobile: risk or opportunity? 8
Cloud and mobile raise security concerns 70 % 614 % of security executives have cloud and mobile concerns Top 3: Data, access, and auditing Mobile malware growth in just one year 2013 IBM CISO Survey 2012-2013 Juniper Mobile Threat Report 9
1 Cloud is an opportunity for enhanced security IaaS PaaS SaaS Maintain cloud visibility and control Leverage crowd sourced threat intelligence Use secure cloud infrastructure and services 10
Employ cloud to improve security with IBM solutions IaaS PaaS SaaS Maintain cloud Leverage crowd sourced Use secure cloud visibility and control threat intelligence infrastructure and services Streamlined number of user A global electronics firm helps protect access to cloud-based applications for 10K employees IBM Security Access Manager An international bank reduced phishing attacks by 90% and phone fraud to almost $0 IBM Trusteer Fraud Protection accounts with cloud-delivered identity and access management for 8.5M automobile customers and employees IBM Lighthouse Gateway 11
2 Build security into mobile deployments from day one Personal DATA Enterprise Security Intelligence Transaction Security Application Security Content Security Device Security Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device Security Content Security Application Security Transaction Security IBM Security Solutions IBM MaaS360 IBM MobileFirst Platform (includes Worklight) IBM Security AppScan IBM Tealeaf IBM Trusteer IBM Security Access Manager 12
Unlock mobile value with new security solutions Personal DATA Enterprise Security Intelligence Transaction Security Application Security Content Security Device Security Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Discovered and enrolled devices in the first 36,000 70,000000 + minutes with ability 60 to wipe the device if lost <500 Chemical company users migrated in the first month Help desk calls (<.5%) IBM Corporation 13
Sophisticated Attackers: traditional defense or a big data solution? 14
For sophisticated attacks, traditional defenses are not enough Users Easy Customer Accounts 15 Easy
Security is a big data and analytics problem Traditional Security Operations and Technology Logs Events Alerts 16 Big Data Analytics System audit trails External threat t feeds Configuration information Business process data Identity context Network flows and anomalies Malware information E-mail and social activity Full packet and DNS captures
3 Stop advanced threats with security intelligence Detect advanced threats with security intelligence Protect against fraud and targeted attacks Deploy integrated security 17
Threat Protection System: Integrated advanced threat defense Endpoint Protection Security Intelligence Incident Forensics Network Protection Emergency Response Services XGS Open Integrations Global Threat Intelligence 18
Helping clients stop advanced threats An International An International A Major Energy Firm Commodities Exchange Health Care Provider Analyzed Maintained system Monitors 2B uptimes of + events per day to find 99.9% + 25K endpoints with 0 and blocked 20-25 reported breaches potential offenses in 3 years in the first 6 months to investigate 200 + high risk infections 19
Leverage intelligence to help prevent fraud Comprehensive solution built upon real-time intelligence and adaptable protection Prevent Root Cause of Fraud Reduce Operational Impact Advanced Fraud Prevention Improve Your Customer Experience Utilize Real-time Intelligence Service 20
IBM Security Solutions 21
IBM Security Portfolio Consulting and Managed Services Integrated Security Technologies Security Intelligence and Operations Security Intelligence and Analytics Strategy, Risk and Compliance Cloud and Managed Services Advanced Fraud Protection Identity and Access Management Services Data and Application Security Services Cybersecurity Assessment and Response Identity and Access Management Data Security Application Security Infrastructure and Threat Protection Advanced Threat and Security Research Key Security Trends Advanced Threats Cloud Adoption Mobile Concerns Compliance Mandates Skills Shortage 22
1 2 3 Cloud is an opportunity for enhanced security Build security into mobile deployments from day one Stop advanced threats with security intelligence 23
IBM has global breadth and scale in Cloud, Mobile and Security Cloud Mobile Security 100 + SaaS offerings 1,500 cloud patents 40K + cloud experts 3,000 1,700 + mobile experts 18 security patents 25 MobileFirst studios global security labs 8 mobile acquisitions 15B+ security events monitored daily in 130 countries 24
Visit us at New Cloud Services and Apps in a Fraction of the Time Wednesday @ 10:15 am Dolphin, Southern 2 IBM Engagement Zone Dolphin Hotel Lobby Made With IBM Booth 10 Expo Join us at the IBM Cloud Café Yacht and Beach Club Schedule your own IBM-supported hackathon. Develop apps in the time it takes to order a latte. 25 #THINKTech
Learn more IBM Security IBM MobileFirst IBM Security Website IBM MobileFirst Website Watch our videos Download the IBV Mobile Study Read our blog Sign up for a free Mobile Agenda Workshop @ibmsecurity @ibmmobile 26
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. www.ibm.com/security Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, 27 or service names may be trademarks or service marks of others.