LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestras Condiciones de uso y nuestra Política de privacidad para más información.
LinkedIn emplea cookies para mejorar la funcionalidad y el rendimiento de nuestro sitio web, así como para ofrecer publicidad relevante. Si continúas navegando por ese sitio web, aceptas el uso de cookies. Consulta nuestra Política de privacidad y nuestras Condiciones de uso para más información.
Mobility has forever transformed the way we work, communicate and socialize. Originating as a consumer-centric phenomena, mobility benefits have compelled organizations to rapidly adopt it as a way to boost employee productivity and customer engagement. Everywhere you look there are proof points and stats that point to the explosive growth in mobility.
1. The number of smartphone users worldwide will surpass 2 billion in 2016, according to new figures from eMarketer - - http://www.emarketer.com/Article/2-Billion-Consumers-Worldwide-Smartphones-by-2016/1011694#sthash.qRMTl192.dpuf
2. "By 2017, mobile apps will be downloaded more than 268 billion times" -- attribution is Garnter -http://www.gartner.com/newsroom/id/2654115
3. "There are 387 new threats every minute, or more than 6 every second." -- McAfee "Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015." http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf
4. Update Arxan data regarding mobile apps - source: Source: State of Security in the App Economy - “Apps Under Attack” (Dec 2014) - 97% of top paid Android apps have been hacked - 87% of top paid iOS apps have been hacked - 80% of the most popular free Android apps have been hacked 75% of the most popular free iOS apps have been hacked https://www.arxan.com/wp-content/uploads/assets1/pdf/State_of_Mobile_App_Security_2014_final.pdf
At IBM we spend time thinking about a holistic solution to this problem. We think it needs to include the 4 key imperatives of enterprise mobility: the device itself, the enterprise content on it and the collaboration with others, the applications & data and managing device access and fraud.
We surveyed hundreds of enterprises late last year about their mobile security journey. We concluded they are half way there: addressing the device and content layers, often with the deployment of enterprise mobility management suites, and starting to look at application security and managing access and fraud. Regardless of where you are in your own journey, we think you should consider the full roadmap and plan accordingly.
Protect Devices Lost devices are the top security concern for 57% of organizations 60% use passcodes for device security; 71% can remote-wipe devices
Secure Content and Collaboration Content theft / leakages are the top concern for 56% of organizations 60% use secure containers for data security; 40% restrict sharing of content
Safeguard Applications and Data Application vulnerabilities are the top concern for 52% of organizations 41% use vulnerability scanners; only 23% have tamper-proofing capabilities
Manage Access and Fraud 32% of organizations are concerned about fraudulent transactions 30% use risk scoring for transactions; only 18% can detect malware / jailbreaks
Source: 2014 Information Security Media Group Survey, sponsored by IBM, “The State of Mobile Security Maturity”
As a technology leader, IBM Mobile Security has developed a Mobile Security framework with a dynamic approach to delivering a comprehensive mobile security strategy. It is a holistic approach to securing the four imperatives of enterprise mobility: the device, the enterprise content and data stored on it, the mobile applications used for employee productivity and the access and fraud concerns inherent with the devices. Underlying this, is an additional layer of protection and visibility through IBM’s security intelligence. Only by addressing all four imperatives can a company truly deploy a comprehensive mobile strategy and protect the assets and reputation of the enterprise.
PROTECT DEVICES - Solutions to deploy and manage a diverse set of mobile devices and roaming devices from corporate owned assets to Bring Your Own Device (BYOD).
SECURE CONTENT & COLLABORATION - Solutions to help secure file and document sharing across devices and SharePoint.
SAFEGUARD APPLICATIONS & DATA – Solutions to develop applications with security by design. Protect enterprise data in both the applications you build and the applications you buy.
MANAGE ACCESS & FRAUD – Solutions to help identify users and protect mobile sessions with customers, business partners, and temporary workers that are not part of your enterprise mobile management framework.
EXTEND SECURITY INTELLIGENCE - A unified architecture for integrating mobile security information and event management (SIEM), log management, anomaly detection, and configuration and vulnerability management.
IBM Mobile Security provides the most complete approach to mobile security allowing customers to implement a mobile security strategy that addresses devices, data, applications and users. These seamless solutions connect to your existing environment allowing you to implement any or all of the portfolio as your needs require. Designed to deliver an exceptional experience, these highly scalable security solutions, along with a unique threat intelligence platform, fuses context and risk awareness to maximize mobility management and security effectiveness.
Let’s start with our first imperative, Protect Devices…..
Every 3 minutes, a device is wiped 87% of millennials always have their smartphone at their side, day and night 78% of millennials spend over 2 hours a day using their smartphones 68% of millennials consider their smartphone to be a personal device Source: Heidi Cohen December 2014 article, “55 US Mobile Facts Every Marketer Needs For 2015” http://heidicohen.com/2015-mobile-marketing/
According to a Pew Research Center report, “46% of smartphone owners say their smartphone is something they couldn't live without.” Source: http://www.pewresearch.org/fact-tank/2015/04/01/6-facts-about-americans-and-their-smartphones/ "By 2017, mobile devices will make up 87 percent of the total sales of Internet-enabled technology" Source: http://blog.landerapp.com/five-online-marketing-trends-for-2014/
Speaker notes Neil?
NEIL AND JIMMY TO PROVIDE SPEAKER NOTES
RAPIDLY DEPLOY DEVICES –
CENTRALLY MANAGE DEVICES –
PROACTIVELY SECURE DEVICES -
Speaker notes neil
An large manufacturer deploys a BYOD program with IBM MobileFirst Protect to enable mobility from the corporate office worker to the field service representative to better serve customers while keeping sensitive data secure.
Next we look at our 2nd imperative, Secure Content and Collaboration
64% of decision-makers read their e-mail via mobile devices.""48% of e-mails are opened on mobile devices."Source: Mark The Marketer, https://markthemarketer.wordpress.com/2014/02/18/73-astonishing-e-mail-marketing-statistics-you-need-to-know - 59% of respondents say they allow employees to share or collaborate on documents if the company provides the mobile deviceSource: “Breaking Bad: The Risk of Unsecure File Sharing”, Ponemon Institute, October 2014http://img.en25.com/Web/IntraLinks/%7B6988b757-8c9f-4d09-9dd6-da59f4083f1f%7D_Intralinks_Ponemon_Research_Report_Q4_2014%5B1%5D.pdf
Speajer notes neil…Box content?
Speaker notes neil, box content
SEPARATE WORK EMAIL -
ENABLE THE SECURE WEB -
COLLABORATE ON CONTENT -
NEIL AND JIMMY TO PROVIDE SPEAKER NOTES – what else can we add? Can we name the company? Any quantifiable benefits we can share?
A retail store chain uses IBM MobileFirst Protect to empower in-store customer service representatives with shared smart devices to securely view inventory & merchandise information while on the store floor.
At this point we have talked about the first two pillars which are focused on protecting the device and securing the content and collaboration. Now we look into applications and data and what needs to be done to safeguard them. In 2014, IBM sponsored a study with the Ponemon Group “The State of Mobile Application Insecurity”. In this study we found that while companies are rapidly developing and deploying mobile applications, very few of them are taking steps to make sure that these applications are secure.
There are 387 new threats every minute, or more than 6 every second." -- McAfee"Total malware in the McAfee Labs zoo grew 17% from Q3 to Q4. At this pace, the zoo will contain more than a half-billion samples by Q3 2015.“ Source: McAfee Labs Threats Report, February 2015http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2014.pdf Through 2017, 75 percent of all mobile security breaches will be through apps, not through deep technical attacks on the OS, according to Gartner"Source: Gartner Press Release, May 2014http://www.gartner.com/newsroom/id/2753017 "Overall mobile app usage grew by 76% in 2014 according to Flurry Analytics"Source: Shopping, Productivity and Messaging Give Mobile Another Stunning Growth Year”, Flurry Insights, January 2015http://flurrymobile.tumblr.com/post/115194992530/shopping-productivity-and-messaging-give-mobile#.VM1WAWR4qPL
Speaker notes – AppScan
Speaker notes – ARXAN
Speaker notes – MobileFirst Protect
Requested from Neil J, Neil F and Jimmy T on 6/24
TEST APP SECURITY –
PROTECT APPS –
SECURE APP DATA –
SAFELY DISTRIBUTE APPS –
95% OF THESE INCIDENTS INVOLVE HARVESTING CREDENTIALS STOLEN FROM CUSTOMER DEVICES, THEN LOGGING INTO WEB APPLICATIONS WITH THEM.
Page 42 of Verizon Data Breech Report.
$3.79 million Average total cost per data breach – Ponemon Institute Cost of Data Breach Study.“
Not mobile specific data…..can we find some…”extending”
The only beneficiaries besides successful hackers are security sellers.
Need only think about the last holiday shopping season – with Target and Neiman Marcus and Michaels
Match-up of above stats to sources:
243 days on a victim's network – https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks
32 days on average to resolve a cyber-crime - ( http://www.eweek.com/security/cyber-crime-costs-continue-to-rise-study.html )
38% of targets were attacked again - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks
63% of victims made aware of breaches by an external organization - ( https://www.mandiant.com/news/release/mandiant-releases-annual-threat-report-on-advanced-targeted-attacks
The QRadar Security Intelligence Platform helps businesses gain visibility over their full security posture and across the entire security event timeline.
The positioning of the main solutions shown here is a general positioning. Vulnerability Manager and Risk Manager deliver a large part of their value in the “pre-exploit” phase. They are focused on detecting configuration errors and other deviations from the norm, and attaining awareness of vulnerabilities and assessing exposures. Log Manager and SIEM deliver a large part of their value at the point where exploits must be detected and on into the remediation phase. The focus is on very quickly taking very large volumes of collected data (events and logs) and analyzing them to get to a manageably small number of true incidents to be further analyzed. Finally, Incident Forensics offers a great deal of its value in helping dramatically reduce the time to remediation and to increase the thoroughness of that remediation.
No matter how many QRadar products are leveraged, or how many appliances constitute a client deployment, all capabilities are leveraged through a single console. The associated benefit is that there is a common interface delivering value in areas such as speed of operation, ease of adoption, transference of skills, and a universal learning curve.
Designed from the beginning to integrate Log Management, SIEM, and Risk Management into one solution, the QRadar Security Intelligence platform delivers massive log management scale without any compromise on SIEM “Intelligence.”
As indicated on the slide, the console integrates many useful data points provided by the different products. This view on the screen provides insights into what the attack was, who was responsible, what the targets were, and provides evidence and accompanying information and data that will help determine the right next steps to take.
In summary, the client is made aware of the incident (that previously would have been hidden in a barrage of data). The client is told what its priority is and is given the information necessary to respond appropriately.
And, the integrated console is robust. Do you need to do some searching? It is in there. Do you need to write some additional filter rules? It is in there. What about reporting? It is in there. It is a very comprehensive set of tools, and a “single pane of glass.”
Also, if a client adds a new QRadar product into the mix, a tab appears for the product. It is visually and programmatically integrated into the Security Intelligence solution for the client.
Client example: An international energy company reduces billions of events per day to find those that should be investigated
Optimize threat analysis - An international energy firm analyzes 2 billion events per day to find 20-25 potential offenses to investigate
Business challenge Reducing huge number of events to find the ones that need to be investigated Automating the process of analyzing security data
Solutions (QRadar SIEM, QFlow, Risk Manager) Combined analysis of historical data with real-time alerts to gain a ‘big picture’ view and uncover patterns of unusual activity humans miss and immediately block suspected traffic
IBM achieved the highest enterprise security revenue of all vendors in 2014, according to Technology Business Research group’s Enterprise Security Market Forecast 2014-2019.
Note: Actual number of countries where IBM delivers managed security services is 134 as of Nov. 2015
90% of the Fortune 100 companies (based on 2014 Fortune 500 rankings) Source: 2015 MI IBM Security Heatmap
Mandatory legal notices and disclaimers slide for external presentations
<Presenter: Marketing team to update slide as MQs are released>
We don’t just talk the talk. IBM is the only vendor with a leader position in 8 Gartner mobile magic quadrants.
<Presenter: Slide to be used for BigFix discussions if needed>
The broadest OS and device set in the industry from servers, PCs, Macs, tablets, smartphones, embedded and hardened devices, POS, and soon IoT
Today’s rapidly evolving threat landscape demands smarter and more responsive managed security services. IBM Managed Security Services offer the industry-leading tools, technology and expertise to secure your information assets 24/7/365, often at a fraction of the cost of in-house security resources. Improve securityIBM maintains the world's largest threat and vulnerability database Reduce costSave up to 55% on information security management Lower riskReliable protection with guaranteed service level agreements
Security operations consulting from IBM provides specialists to help you assess and refine your strategy and then work with you to design a SOC with end-to-end threat management capabilities.
Security operations consulting from IBM helps you establish a SOC designed to deliver a single view of security threats for real-time decision making. With these capabilities, you can: Optimize your ability to react to and contain cyber security events Reduce financial and operational impact to your business Develop a more proactive security posture