SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
5 Steps for End-to-End Mobile App
Security with Consumer Apps
Tyson Whitten
Mobile Security Product Marketing - CA Technologies
Leif Bildoy
CA Layer 7 Product Management - CA Technologies
February 20, 2014

© 2014 CA. All rights reserved.
Housekeeping

Leif Bildoy

Tyson Whitten

Leif.Bildoy@ca.com

Tyson.Whitten@ca.com

CA Technologies

CA Technologies

layer7.com & security.com
layer7.com/blogs
@layer7 & @CASecurity
Layer 7 & CATechnologies

2

© 2014 CA. All rights reserved.

Chat questions into the
sidebar or use hashtag:
#L7webinar
Mobile Growth Continues

$77B
Mobile app revenue
generated by 2017

?

... It’s An App, Happy World

• Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie
Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013.
3

© 2014 CA. All rights reserved.
Mobile Growth Continues

82%

40

268B

Time spent with apps

Average apps per
device

Mobile app
downloads
by 2017

vs. browsers

... It’s An App, Happy World
• Harvard Business Review, “For Mobile Devices, Think Apps, Not Ads”, Sunil Gupta, Head of HBR Marketing. March 2013.
• Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie
Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013.
4

© 2014 CA. All rights reserved.
Everyone is working on a mobility revenue strategy
Zillow Mobile App
RealQuest.com

Device GPS

DiverseSolutions.com

Owner Input

WalkScore.com

GeoScan.com

5

© 2014 CA. All rights reserved.
Mobility Form Factors Power Innovation

Nike+ Mobile App

6

© 2014 CA. All rights reserved.
Consumer App Security Risks
Protected Health Information
(PHI)

sync

7

© 2014 CA. All rights reserved.
How to Achieve End-to-End Security for Consumer Apps

 App Risk
 Understanding the Solution Landscape
 Securing the backend
 Protecting the app
 Maintaining the user experience

8

© 2014 CA. All rights reserved.
Step #1: Identify Risk Level of Your Apps
IP, NPI,
PHI & PII

WHAT
Business impact

WHERE
Likelihood of a threat

WHO
9

Risk level = Business impact reserved.
© 2014 CA. All rights Likelihood of a threat
What Consumer App Security Solutions are Available?

Control the App by controlling the device
10

© 2014 CA. All rights reserved.
Step #2: Understand Where MDM/MAM Fits

Features

Enterprise Consumer

Authentication





Authorization





Social Login





SSO





Encryption (inmotion, atrest)





11

© 2014 CA. All rights reserved.
Step #2: Understand Where MDM/MAM Fits

Features

Enterprise Consumer

Authentication





Authorization





Social Login





SSO





Encryption (inmotion, atrest)





Device
Management
Policies
(camera, GPS,
etc)



-

BYOD Policies not for Consumer Scenarios
12

© 2014 CA. All rights reserved.
What does that leave for App Solutions?

Web

API

Web Browser

13

Native App

© 2014 CA. All rights reserved.
Understanding APIs are Core to Consumer Apps

Web

API

Web Browser

14

Native App

© 2014 CA. All rights reserved.
Step #3: Securing the App starting with the API

Threats
Composite Apps

Malicious Apps

15

Performance

Developer
Access
© 2014 CA. All rights reserved.
What about the Other End?

API

API

API

16

© 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security

User

Apps
17

© 2014 CA. All rights reserved.

Devices
Step #4: How Secure App Development Complements API
Security
Name
Address
Email

Group

UserID
Phone
number

Password

User

Package
name

Managed
Group

Name

Screen
Size

Signer
App mix

AppID

SW

Permissions
HW version
Footprint
SW version

Apps
HW
Accelerated
18

DeviceID
© 2014 CA. All rights reserved.

Devices
Step #4: How Secure App Development Complements API
Security
Name
Address
Email

Group

UserID

Martial
Status

Phone
number
Social
Graph

Password

User

Package
name
Name

Screen
Size
AppID

HW version

Apps

SW version
DeviceID

19

© 2014 CA. All rights reserved.

Devices
Step #4: How Secure App Development Complements API
Security
OAuth + OpenID Connect + PKI
 Profiled for mobile
 Clear distinction between device, user and app

username/password
ID Token (JWT Or
SM Session Cookie

A

B

C

Per app

Access Token/Refresh Token

Certificate Signing
Request
MAG
Signed Cert

20

Authorization
Server

© 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security

Two-factor Auth
Social Login
Single Sign-On

21

© 2014 CA. All rights reserved.
Securing the Mobile App to the Backend API
Mutual SSL
Mutual SSL
API

API

Fine-grained API
Access Control
Threat Protection

Two-factor Auth
Social Login
Single Sign-On

22

© 2014 CA. All rights reserved.

API
Step #5: How the Right End-to-End Mobile Security
Solution Improves the User Experience
Social
Login

APIs

API
A B C

SSO

The Right Combination of Content & Security Features
23

© 2014 CA. All rights reserved.
Mobile Access Gateway

24

© 2014 CA. All rights reserved.
Mobile SDK – Simplified & secure consumption of APIs


Leverage mobile OS security to create a
secure sign-on container



Standards based OAuth 2.0, OpenID Connect,
and JWT



Secure provisioning through CA Layer 7
Mobile Access Gateway



Client-side libraries implementing common
security aspects
– iOS 6/7, Android 4.x & Adobe PhoneGap
– Easy-to-use device API for adding app to
SSO session and mutual SSL
– Single API call to leverage cryptographic
security, OAuth, OpenID Connect, and
JWT
– SDK with sample code & documentation

25

© 2014 CA. All rights reserved.

Layer 7 Mobile Single Sign On Solution is
a complete end-to-end standards-based
security solution.
CA Technologies Provides Unique Capabilities to Meet
the Evolving Needs of the Open Enterprise
End-to-End Mobile Security

Accelerate secure application
delivery: Build, Deploy & Secure

Convenience

26

Balance Security and User
Convenience

© 2014 CA. All rights reserved.
Questions?
Copyright © 2014 CA. The Windows logo is either a registered trademark or trademark of Microsoft Corporation in the United States
and/or other countries. The Symantec is either a registered trademark or trademark of Symantec Corporation in the United States
and/or other countries. The Good logo is either a registered trademark or trademark of Good Corporation in the United States and/or
other countries. The Airwatch logo is either a registered trademark or trademark of Airwatch Corporation in the United States and/or
other countries. The MobileIron logo is either a registered trademark or trademark of MobileIron Corporation in the United States
and/or other countries. The Samsung logo is either a registered trademark or trademark of Samsung Corporation in the United States
and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
Certain information in this publication may outline CA’s general product direction. However, CA may make modifications to any CA
product, software program, method or procedure described in this publication at any time without notice, and the development,
release and timing of any features or functionality described in this publication remain at CA’s sole discretion. CA will support only the
referenced products in accordance with (i) the documentation and specifications provided with the referenced product, and (ii)CA’s
then-current maintenance and support policy for the referenced product. Notwithstanding anything in this publication to the contrary,
this publication shall not: (i) constitute product documentation or specifications under any existing or future written license
agreement or services agreement relating to any CA software product, or be subject to any warranty set forth in any such written
agreement; (ii) serve to affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement
or services agreement relating to any CA software product; or (iii) serve to amend any product documentation or specifications for any
CA software product.
THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of
the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY
KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation,
including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly
advised in advance of the possibility of such damages.
28

© 2014 CA. All rights reserved.

Más contenido relacionado

La actualidad más candente

Android_Application_Developer_2.0Exp_Resume
Android_Application_Developer_2.0Exp_ResumeAndroid_Application_Developer_2.0Exp_Resume
Android_Application_Developer_2.0Exp_ResumeKishore Ganji
 
Karthick profile
Karthick profileKarthick profile
Karthick profileKarthick D
 
Top 5 Ways To Increase API Adoption
Top 5 Ways To Increase API AdoptionTop 5 Ways To Increase API Adoption
Top 5 Ways To Increase API AdoptionProgrammableWeb
 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb
 
Android Developer Resume Fresher
Android Developer Resume FresherAndroid Developer Resume Fresher
Android Developer Resume Fresherbhanu pro
 
Resume-Android Developer
Resume-Android DeveloperResume-Android Developer
Resume-Android DeveloperNikhil Desale
 
Doddanna_B_Java_Android_Trnd_EC_70%
Doddanna_B_Java_Android_Trnd_EC_70%Doddanna_B_Java_Android_Trnd_EC_70%
Doddanna_B_Java_Android_Trnd_EC_70%Doddanna B
 
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...Simon Bates
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategyitnewsafrica
 
Sumit Kumar_Singh_visualcv_resume
Sumit Kumar_Singh_visualcv_resumeSumit Kumar_Singh_visualcv_resume
Sumit Kumar_Singh_visualcv_resumeSumit Kumar Singh
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
Mobile Developer Conference 2012 Hamburg, Germany Keynote
Mobile Developer Conference 2012 Hamburg, Germany KeynoteMobile Developer Conference 2012 Hamburg, Germany Keynote
Mobile Developer Conference 2012 Hamburg, Germany KeynoteJeff Haynie
 
PPT on Android Applications
PPT on Android ApplicationsPPT on Android Applications
PPT on Android ApplicationsAshish Agarwal
 
Mobile App Testing
Mobile App TestingMobile App Testing
Mobile App TestingDuy Tan Geek
 

La actualidad más candente (20)

Android_Application_Developer_2.0Exp_Resume
Android_Application_Developer_2.0Exp_ResumeAndroid_Application_Developer_2.0Exp_Resume
Android_Application_Developer_2.0Exp_Resume
 
Karthick profile
Karthick profileKarthick profile
Karthick profile
 
Appium vs. Appium with Perfecto
Appium vs. Appium with PerfectoAppium vs. Appium with Perfecto
Appium vs. Appium with Perfecto
 
Top 5 Ways To Increase API Adoption
Top 5 Ways To Increase API AdoptionTop 5 Ways To Increase API Adoption
Top 5 Ways To Increase API Adoption
 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research Report
 
Smart Phones Software Inc Ppt
Smart Phones Software Inc PptSmart Phones Software Inc Ppt
Smart Phones Software Inc Ppt
 
Android Developer Resume Fresher
Android Developer Resume FresherAndroid Developer Resume Fresher
Android Developer Resume Fresher
 
Resume_vipul
Resume_vipulResume_vipul
Resume_vipul
 
Resume-Android Developer
Resume-Android DeveloperResume-Android Developer
Resume-Android Developer
 
awadhesh online
awadhesh onlineawadhesh online
awadhesh online
 
Doddanna_B_Java_Android_Trnd_EC_70%
Doddanna_B_Java_Android_Trnd_EC_70%Doddanna_B_Java_Android_Trnd_EC_70%
Doddanna_B_Java_Android_Trnd_EC_70%
 
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...
Simon Bates, Manifesto Digital - Mobile Application Development: Past, Presen...
 
Considerations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by MicrostrategyConsiderations when building mobile app. Presented by Microstrategy
Considerations when building mobile app. Presented by Microstrategy
 
Sumit Kumar_Singh_visualcv_resume
Sumit Kumar_Singh_visualcv_resumeSumit Kumar_Singh_visualcv_resume
Sumit Kumar_Singh_visualcv_resume
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
Mobile Developer Conference 2012 Hamburg, Germany Keynote
Mobile Developer Conference 2012 Hamburg, Germany KeynoteMobile Developer Conference 2012 Hamburg, Germany Keynote
Mobile Developer Conference 2012 Hamburg, Germany Keynote
 
Apps development company new york
Apps development company new yorkApps development company new york
Apps development company new york
 
PPT on Android Applications
PPT on Android ApplicationsPPT on Android Applications
PPT on Android Applications
 
Mobile App Testing
Mobile App TestingMobile App Testing
Mobile App Testing
 
Deeksha_cv
Deeksha_cvDeeksha_cv
Deeksha_cv
 

Destacado

Facts About Mobile App Development
Facts About Mobile App DevelopmentFacts About Mobile App Development
Facts About Mobile App DevelopmentRedbytes Software
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Mobile App Development Singapore
Mobile App Development SingaporeMobile App Development Singapore
Mobile App Development SingaporeMYOB!Assist
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Agreement sample between iPhone App Developers and customers (startups/ enter...
Agreement sample between iPhone App Developers and customers (startups/ enter...Agreement sample between iPhone App Developers and customers (startups/ enter...
Agreement sample between iPhone App Developers and customers (startups/ enter...Sudeep Bhatnagar
 
Publishing and delivery of mobile application
Publishing and delivery of mobile applicationPublishing and delivery of mobile application
Publishing and delivery of mobile applicationK Senthil Kumar
 
Service Level Agreement
Service Level AgreementService Level Agreement
Service Level Agreementdlfrench
 
Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)termsfeed
 

Destacado (8)

Facts About Mobile App Development
Facts About Mobile App DevelopmentFacts About Mobile App Development
Facts About Mobile App Development
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Mobile App Development Singapore
Mobile App Development SingaporeMobile App Development Singapore
Mobile App Development Singapore
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Agreement sample between iPhone App Developers and customers (startups/ enter...
Agreement sample between iPhone App Developers and customers (startups/ enter...Agreement sample between iPhone App Developers and customers (startups/ enter...
Agreement sample between iPhone App Developers and customers (startups/ enter...
 
Publishing and delivery of mobile application
Publishing and delivery of mobile applicationPublishing and delivery of mobile application
Publishing and delivery of mobile application
 
Service Level Agreement
Service Level AgreementService Level Agreement
Service Level Agreement
 
Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)Terms & Conditions for mobile apps (iOS, Android, Windows)
Terms & Conditions for mobile apps (iOS, Android, Windows)
 

Similar a 5 Steps for End-to-End Mobile Security with Consumer Apps

Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless WorkplaceCA Technologies
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 
Kony Mobility Platform
Kony Mobility PlatformKony Mobility Platform
Kony Mobility PlatformVeeresh Nirni
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfFuGenx Technologies
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammerOur Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammeriProgrammer Solutions
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 

Similar a 5 Steps for End-to-End Mobile Security with Consumer Apps (20)

Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
A Secure Insurance Business App for iPhone and Android
A Secure Insurance Business App for iPhone and AndroidA Secure Insurance Business App for iPhone and Android
A Secure Insurance Business App for iPhone and Android
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 
Kony Mobility Platform
Kony Mobility PlatformKony Mobility Platform
Kony Mobility Platform
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammerOur Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 

Más de CA API Management

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?CA API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...CA API Management
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 

Más de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

5 Steps for End-to-End Mobile Security with Consumer Apps

  • 1. 5 Steps for End-to-End Mobile App Security with Consumer Apps Tyson Whitten Mobile Security Product Marketing - CA Technologies Leif Bildoy CA Layer 7 Product Management - CA Technologies February 20, 2014 © 2014 CA. All rights reserved.
  • 2. Housekeeping Leif Bildoy Tyson Whitten Leif.Bildoy@ca.com Tyson.Whitten@ca.com CA Technologies CA Technologies layer7.com & security.com layer7.com/blogs @layer7 & @CASecurity Layer 7 & CATechnologies 2 © 2014 CA. All rights reserved. Chat questions into the sidebar or use hashtag: #L7webinar
  • 3. Mobile Growth Continues $77B Mobile app revenue generated by 2017 ? ... It’s An App, Happy World • Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013. 3 © 2014 CA. All rights reserved.
  • 4. Mobile Growth Continues 82% 40 268B Time spent with apps Average apps per device Mobile app downloads by 2017 vs. browsers ... It’s An App, Happy World • Harvard Business Review, “For Mobile Devices, Think Apps, Not Ads”, Sunil Gupta, Head of HBR Marketing. March 2013. • Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013. 4 © 2014 CA. All rights reserved.
  • 5. Everyone is working on a mobility revenue strategy Zillow Mobile App RealQuest.com Device GPS DiverseSolutions.com Owner Input WalkScore.com GeoScan.com 5 © 2014 CA. All rights reserved.
  • 6. Mobility Form Factors Power Innovation Nike+ Mobile App 6 © 2014 CA. All rights reserved.
  • 7. Consumer App Security Risks Protected Health Information (PHI) sync 7 © 2014 CA. All rights reserved.
  • 8. How to Achieve End-to-End Security for Consumer Apps  App Risk  Understanding the Solution Landscape  Securing the backend  Protecting the app  Maintaining the user experience 8 © 2014 CA. All rights reserved.
  • 9. Step #1: Identify Risk Level of Your Apps IP, NPI, PHI & PII WHAT Business impact WHERE Likelihood of a threat WHO 9 Risk level = Business impact reserved. © 2014 CA. All rights Likelihood of a threat
  • 10. What Consumer App Security Solutions are Available? Control the App by controlling the device 10 © 2014 CA. All rights reserved.
  • 11. Step #2: Understand Where MDM/MAM Fits Features Enterprise Consumer Authentication   Authorization   Social Login   SSO   Encryption (inmotion, atrest)   11 © 2014 CA. All rights reserved.
  • 12. Step #2: Understand Where MDM/MAM Fits Features Enterprise Consumer Authentication   Authorization   Social Login   SSO   Encryption (inmotion, atrest)   Device Management Policies (camera, GPS, etc)  - BYOD Policies not for Consumer Scenarios 12 © 2014 CA. All rights reserved.
  • 13. What does that leave for App Solutions? Web API Web Browser 13 Native App © 2014 CA. All rights reserved.
  • 14. Understanding APIs are Core to Consumer Apps Web API Web Browser 14 Native App © 2014 CA. All rights reserved.
  • 15. Step #3: Securing the App starting with the API Threats Composite Apps Malicious Apps 15 Performance Developer Access © 2014 CA. All rights reserved.
  • 16. What about the Other End? API API API 16 © 2014 CA. All rights reserved.
  • 17. Step #4: How Secure App Development Complements API Security User Apps 17 © 2014 CA. All rights reserved. Devices
  • 18. Step #4: How Secure App Development Complements API Security Name Address Email Group UserID Phone number Password User Package name Managed Group Name Screen Size Signer App mix AppID SW Permissions HW version Footprint SW version Apps HW Accelerated 18 DeviceID © 2014 CA. All rights reserved. Devices
  • 19. Step #4: How Secure App Development Complements API Security Name Address Email Group UserID Martial Status Phone number Social Graph Password User Package name Name Screen Size AppID HW version Apps SW version DeviceID 19 © 2014 CA. All rights reserved. Devices
  • 20. Step #4: How Secure App Development Complements API Security OAuth + OpenID Connect + PKI  Profiled for mobile  Clear distinction between device, user and app username/password ID Token (JWT Or SM Session Cookie A B C Per app Access Token/Refresh Token Certificate Signing Request MAG Signed Cert 20 Authorization Server © 2014 CA. All rights reserved.
  • 21. Step #4: How Secure App Development Complements API Security Two-factor Auth Social Login Single Sign-On 21 © 2014 CA. All rights reserved.
  • 22. Securing the Mobile App to the Backend API Mutual SSL Mutual SSL API API Fine-grained API Access Control Threat Protection Two-factor Auth Social Login Single Sign-On 22 © 2014 CA. All rights reserved. API
  • 23. Step #5: How the Right End-to-End Mobile Security Solution Improves the User Experience Social Login APIs API A B C SSO The Right Combination of Content & Security Features 23 © 2014 CA. All rights reserved.
  • 24. Mobile Access Gateway 24 © 2014 CA. All rights reserved.
  • 25. Mobile SDK – Simplified & secure consumption of APIs  Leverage mobile OS security to create a secure sign-on container  Standards based OAuth 2.0, OpenID Connect, and JWT  Secure provisioning through CA Layer 7 Mobile Access Gateway  Client-side libraries implementing common security aspects – iOS 6/7, Android 4.x & Adobe PhoneGap – Easy-to-use device API for adding app to SSO session and mutual SSL – Single API call to leverage cryptographic security, OAuth, OpenID Connect, and JWT – SDK with sample code & documentation 25 © 2014 CA. All rights reserved. Layer 7 Mobile Single Sign On Solution is a complete end-to-end standards-based security solution.
  • 26. CA Technologies Provides Unique Capabilities to Meet the Evolving Needs of the Open Enterprise End-to-End Mobile Security Accelerate secure application delivery: Build, Deploy & Secure Convenience 26 Balance Security and User Convenience © 2014 CA. All rights reserved.
  • 28. Copyright © 2014 CA. The Windows logo is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. The Symantec is either a registered trademark or trademark of Symantec Corporation in the United States and/or other countries. The Good logo is either a registered trademark or trademark of Good Corporation in the United States and/or other countries. The Airwatch logo is either a registered trademark or trademark of Airwatch Corporation in the United States and/or other countries. The MobileIron logo is either a registered trademark or trademark of MobileIron Corporation in the United States and/or other countries. The Samsung logo is either a registered trademark or trademark of Samsung Corporation in the United States and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. Certain information in this publication may outline CA’s general product direction. However, CA may make modifications to any CA product, software program, method or procedure described in this publication at any time without notice, and the development, release and timing of any features or functionality described in this publication remain at CA’s sole discretion. CA will support only the referenced products in accordance with (i) the documentation and specifications provided with the referenced product, and (ii)CA’s then-current maintenance and support policy for the referenced product. Notwithstanding anything in this publication to the contrary, this publication shall not: (i) constitute product documentation or specifications under any existing or future written license agreement or services agreement relating to any CA software product, or be subject to any warranty set forth in any such written agreement; (ii) serve to affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (iii) serve to amend any product documentation or specifications for any CA software product. THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. 28 © 2014 CA. All rights reserved.