take an integrated approach to mobile security & address the full breadth of threats
TRANSCRIPT
© 2015 IBM Corporation
Take an integrated approach to mobile security & address the full breadth of threats
Jason HardyWorldwide Market Segment Manager, Mobile SecurityIBM Security
IBM Mobile Security
2© 2015 IBM Corporation
by 2017Mobile downloadswill increase to
268 billionGartner
by 2016The number of smartphone users worldwide will surpass
2 billioneMarketer
Enterprise mobile trends
“Enterprise mobility will continue to be one of the hottest topics in IT,and high on the list of priorities for all CIOs.”
Ovum
“IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.”
IDC
3© 2015 IBM Corporation
387new threats every minute or more than six every secondMcAfee
As mobile grows, so do security threats
“With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory.”
Gartner
“Enterprise mobility… new systems of engagement.These new systems help firms empower their customers, partners,
and employees with context-aware apps and smart products.”Forrester
Arxan
Top mobile devicesand apps hacked 97% Android
87% iOS
4© 2015 IBM Corporation
What concerns does this create for the enterprise?
Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity”
32% are concerned about fraudulent transactions
Only 18% can detect malware / jailbreaks
52% worry aboutapplication vulnerabilities
Only 23% have tamper-proofing capabilities
50% are content and data leakage are their top security concern
60% use secure containersfor data security
57% say a lost or stolen device is top concern
60% use passcodesfor device security
5© 2015 IBM Corporation
MobileFirstProtect (MaaS360)
AppScan, Arxan, Trusteer M; bile SDK
IBM Mobile Security Framework
AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana
HP Fortify, Veracode, Proguard CA, Oracle, RSA
• Manage multi-OS BYOD environment
• Mitigate risks of lost and compromised devices
• Separate enterprise and personal data
• Enforce compliance with security policies
• Distribute and control enterprise apps
• Build and secure apps and protect them “in the wild”
• Provide secure web, mobile, API access and identify device risk
• Meet authentication ease-of-use expectation
Extend Security Intelligence
• Extend security information and event management (SIEM) to mobile platform• Incorporate mobile log management, anomaly detection, configuration and vulnerability management
Manage Access and Fraud
Safeguard Applications and Data
Secure Content and Collaboration
Protect Devices
6© 2015 IBM Corporation
IBM Mobile Security Portfolio
IBM Security Access
Manager
IBMDataPower Gateway
IBMBigFix
IBMMobileFirst
Platform
IBM MaaS360
IBMSecurity AppScan
ArxanApplicationProtection
for IBMSolutions
IBM QRadarSecurity
IntelligencePlatform
IBMSecurity Trusteer
IBMMobile
Security Services
7© 2015 IBM Corporation
IBM Mobile Security Speaker Panel
Anar TaoriPrincipal Offering Manager for IBM MaaS360
Shaked VaxTrusteer Products Strategist
Brian MulliganOffering Manager, IBM Security Access and Directory
David MarshakSenior Product Manager, Application Security
Jason HardyWW Market Segment Manager, Mobile Security
8© 2015 IBM Corporation
MobileFirstProtect (MaaS360)
AppScan, Arxan, Trusteer M; bile SDK
IBM Mobile Security Framework
AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana
HP Fortify, Veracode, Proguard CA, Oracle, RSA
• Manage multi-OS BYOD environment
• Mitigate risks of lost and compromised devices
• Separate enterprise and personal data
• Enforce compliance with security policies
• Distribute and control enterprise apps
• Build and secure apps and protect them “in the wild”
• Provide secure web, mobile, API access and identify device risk
• Meet authentication ease-of-use expectation
Extend Security Intelligence
• Extend security information and event management (SIEM) to mobile platform• Incorporate mobile log management, anomaly detection, configuration and vulnerability management
Manage Access and Fraud
Safeguard Applications and Data
Secure Content and Collaboration
Protect Devices
© 2015 IBM Corporation
Follow me on social media…Jason E HardyWorldwide Market Segment Manager, Mobile SecurityIBM Security
Twitter: jehardy01LinkedIn: www.linkedin.com/in/JasonEHardy
Interested in updates from IBM Mobile Security?