IBM Cognitive IBM Future of Work Forum The Engaged Enterprise Comes Alive Improving Organizational Collaboration and Efficiency While Enhancing Security on Mobile and Cloud Apps Chris Hockings IBM Master Inventor
Smartphones bring great opportunity to help drive better IT process Utilize the best aspects of the device to drive better engagement Good design incorporates new platform elements Trusted computing modules GPS and geolocational data Behavioral elements Profile/sandbox 2 9/9/2016 2016 IBM
Allowing users to bring their own Apps for their Mobile from Cloud Bring your own Apps Bring your own Authentication Bring your own Data Bring your own Network Bring your own Social Bring your own Expectations! 3 9/9/2016 2016 IBM
Today s IBM Security focus areas ADVANCED ATTACKS INNOVATION SKILLS GAP HUMAN ERROR COMPLIANCE We re focusing today on Innovation 4 9/9/2016 2016 IBM
Yes, Mobiles and Clouds have security problems The Cloud Security Alliance (CSA) recently published Cloud Computing s Top Threats in 2016 report: Threat No. 1: Data breaches #2 Cloud Security Concern: Insufficient Identity, Credential and Access Management Threat No. 3: Hacked interfaces and APIs Threat No. 4: Exploited system vulnerabilities Threat No. 5: Account hijacking #6 Cloud Security Concern: Malicious Insiders Threat No. 7: The APT parasite The list below represents the OWASP Mobile Top Ten 2016: #8 Cloud Security Concern: Permanent data loss Threat No. 9: Inadequate diligence Threat No. 10: Cloud service abuses Threat No. 1: Weak Server Side Controls Threat No. 11: DoS attacks Threat No. 2: Insecure Data Storage Threat No. 12: Shared technology, shared dangers Threat No. 3: Insufficient Transport Layer Protection #4 Mobile Security Concern: Unintended Data Leakage #5 Mobile Security Concern: Poor Authorization and Authentication Threat No. 6: Broken Cryptography Threat No. 7: Client Side Injection Threat No. 8: Security Decisions Via Untrusted Inputs #9 Mobile Security Concern: Improper Session Handling Threat No. 10: Lack of Binary Protection 5 9/9/2016 2016 IBM
Why IBM and Box The Security Perspective 1 2 3 Transform work for your industry by delivering the right information to your people, customers and partners wherever they are Reduce risk with best in-class security, compliance, and global availability Joint development activities to deliver new innovation for content rich applications 6 9/9/2016 2016 IBM
Which basic security technology domains help the enterprise? 7 9/9/2016 2016 IBM
Engagement is a critical aspect of security programs of work QRadar Incident Forensics BigFix QRadar Risk Manager zsecure Trusteer Apex MobileFirst Protect (MaaS360) Network Protection XGS Endpoint SiteProtector Network Mobile AppScan QRadar SIEM Trusteer Mobile Applications Security Intelligence QRadar Log Manager Advanced Fraud Trusteer Pinpoint Web Security Gateways Guardium Data Key Lifecycle Manager IBM X-Force Research Consulting Services Managed Services QRadar Vulnerability Manager Identity Manager Access Manager Identity and Access Trusteer Rapport Privileged Identity Manager Identity Governance and Intelligence 8 9/9/2016 2016 IBM
Identify your users, secure and retain identity controls Access Management for user preferred authentication and Single Sign-on capability On-premise employee or customer authentication scenarios Identity governance and privileged identity management Lifecycle management of your employees as they enter and leave the organization #5 Mobile Security Concern: Poor Authorization and Authentication #6 Cloud Security Concern: Malicious Insiders 9 9/9/2016 2016 IBM
Keep enterprise mobile content secure Single console to control and manage all apps, including Box Enforces policies to ensure data is secure based on a user s role or device security posture Pre-integrated with Box APIs #8 Cloud Security Concern: Permanent data loss #4 Mobile Security Concern: Unintended Data Leakage #9 Mobile Security Concern: Improper Session Handling 10 9/9/2016 2016 IBM
Let s see them in action 11 9/9/2016 2016 IBM
Securely understand and then deploy cloud services EMPLOYEES BYOD RISKY APPS Detect and track approved services while blocking shadow apps ON PREM APPROVED APPS Leverage standard Box protocols for single sign on (SSO) for seamless user experience MOBILE DETECT CONNECT PROTECT App catalog to connect users to approved cloud apps Discovery and Visibility Identity and Access Control Cloud Event Correlation Threat Prevention Policy Enforcement Know what your users are doing both on premise and from the cloud #2 Cloud Security Concern: Insufficient Identity, Credential and Access Management #4 Mobile Security Concern: Unintended Data Leakage 12 9/9/2016 2016 IBM
box and IBM Cloud Security Enforcer in action Connect Users with Enterprise Box instance, provide SSO, provide governance 13 9/9/2016 2016 IBM
box and IBM MaaS360 MDM in action Open a File on box, authenticate to the Enterprise 14 9/9/2016 2016 IBM
Office365, IBM MaaS360 MDM and box in action Select to edit the file using Office365 15 9/9/2016 2016 IBM
Summary Employees expect the same engagement at work as in life Cloud and Mobile is helping enterprise achieve similar levels of engagement Threat actors are focusing efforts to exploit vulnerabilities in cloud and mobile services Enterprise collaboration can be enabled by applying identity and mobile security controls Standardizing on services such as Box for storage and help concentrate investment and therefore optimize spend 16 9/9/2016 2016 IBM
THANK YOU. 17 9/9/2016 2016 IBM