security in a mobile worldbtg.org/wp-content/uploads/2015/03/ibm-btg... · everything is being...

35
Security in a mobile world Christian Visser IBM, OFFICE OF THE CIO

Upload: others

Post on 15-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Security in a mobile world

Christian Visser

IBM, OFFICE OF THE CIO

Page 2: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Within each essential practice, move from manual and reactive to

automated and proactive to achieve optimized security.

Page 3: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Scope of mobility at IBM

Page 4: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Capabilities provided to all IBMers

Page 5: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Mobile enablement model at IBM

Page 6: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

It’s 2015, isn’t mobile supposed to be secure by now?

Page 7: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

So why are we still worried about mobile security?

Page 8: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Anything that is connected to the internet can be hacked.

Everything is being connected to the internet.

Page 9: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 10: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 11: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Do not underestimate the time, effort and importance of a strong policy

Page 12: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 13: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Education for IBM employees

Page 14: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 15: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Historical perimeter-based enterprise security model

Page 16: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Emerging mobile - cloud security model

Page 17: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Original industry vision for mobile security

Page 18: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Where the industry ended up in terms of mobile security

Page 19: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Focus security where it matters,

give more flexibility where it doesn’t

Page 20: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

CIO trusted access services model

Page 21: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Options for trust enforcement

Page 22: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Overall approach

Page 23: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 24: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Success requires usable security

Page 25: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

IBM’s approach to securing the intersection of mobile, social, cloud….

Page 26: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Mobile speed requires cloud speed Maas360 migration

Page 27: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

27

Mobile Device Provisioning and Setup Improved Dramatically Through Automation and Apple + IBM Partnership

Instantaneous setup

5 Minutes To set up IBM seller’s iPads with security profile and IBM apps (instead of 2 hours).

16 IBM Apps • auto-installed on Seller’s iPads.

• Frictionless setup. Get productive right away

Auto-configuration of

IBM Collaboration Apps with Fiberlink MaaS360

43K iPads deployed by mid 2015

Deployed by IBM CIO Team using MaaS360 and Apple’s Device Enrollment Program

E-mail, Calendar using IBM Traveler Time reduced from 4 days.

Single global process instead of 10 regional processes

Mobile provisioning

Page 28: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Takeaways

Security is more than IT only, importance of enterprise security strategy, policies and education Focus security where it matters and apply holistic integrated approach

Page 29: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

DELIVERY MODELS

SECURITY TRENDS

Skills Shortage

Compliance Mandates

Cloud Advanced Threats

Mobile and Internet of Things

Strategy, Risk and Compliance Cybersecurity Assessment and Response

Security Intelligence and Operations

Advanced Fraud

Protection

Identity and Access

Management

Data Security

Application Security

Network, Mobile and Endpoint Protection

Advanced Threat and Security Research

IBM’s security portfolio

Management Consulting

Systems Integration

Integrated Products

Security as a Service

Managed Security

Partner Ecosystem

Page 30: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

[email protected]

@visserchristian

Page 31: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Case Study Maas360 Railcom

Page 32: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Waterschap Brabantse Delta

Challenges

•WBA used an alternative MDM tool in the past but they were looking for a secured extension of sharing corporate data over VPN connections.

•Secure the mail backed to the front-end Mobile devices

•Co-workers with other MDM profiles conflict with new MDM profiles

Solution & Benefits

MaaS360 offered WBA a possibility to offer them a secured VPN access to these Mobiles devices so all mobile engineers are now able to access WBA data into a secured Mobile cloud.

Results:

•Secure VPN access

•Secure Mail (AES 256 bit encrypted)

•Full Mobile management

•Corporate App management

Waterschap Brabantse Delta (WBA)

•Located in Breda, NL

•Industry: Government

•Services: Governs the Water Management Systems for +-800k people, 25k companies within 21 local communes in the south of Holland.

Page 33: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

Go Vlaanderen

Challenges

Most schools using a BYOD strategy to share student/school data on these mobile devices.

Teachers are keen to share school data content within a education secured network.

Solution & Benefits

With MaaS360 GO Vlaanderen offers a single Mobile framework to offer schools the opportunity to leverage secure school data into a well secured container ( Doc share)

Results:

•Students/teachers can easily enroll to the service ( 5min job)

•Teachers can share Daily tasks and control the delivery to Students

•Students can edit School task on a mobile devices and forward results

•Go Vlaanderen uses one ‘single pane of glass’ to access to thousands of mobile devices (BYOD) .

Go Vlaanderen (flemish Public school system)

•Located in Brussels, Be

•Industry: Government

•Services: Public entity that embodies the Flemish Public school systems with +- 28 School Entities/regions with +-40 teachers and +-1,2million students

Page 34: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

OCMW Zwijndrecht ( Antwerp)

Challenges

The OCMW had the challenge to manage the mobile workers on the field. Some of the data shared with their employees are confidential information.

Solution & Benefits

MaaS360 offered OCMW a single pane of glass to connect all ipads on the field with the backend system

Results:

•Mail backend is securely presented on these Tablets ( AES 256 bit encrypted)

•PDF files can be shared in a secured way

• Manage and track devices on the field

•Positive ROI via SaaS model

OCMW Zwijndrecht

•Located in Antwerp, Be

•Industry: Government

•Services: Public center for social welfare

Page 35: Security in a mobile worldbtg.org/wp-content/uploads/2015/03/IBM-BTG... · Everything is being connected to the internet. IBM’s approach to securing the intersection of mobile,

BeNelux Business Partners