take an integrated approach to mobile security & address the full breadth of threats

9
© 2015 IBM Corporation Take an integrated approach to mobile security & address the full breadth of threats Jason Hardy Worldwide Market Segment Manager, Mobile Security IBM Security IBM Mobile Security

Upload: ibm-security

Post on 13-Apr-2017

1.311 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

© 2015 IBM Corporation

Take an integrated approach to mobile security & address the full breadth of threats

Jason HardyWorldwide Market Segment Manager, Mobile SecurityIBM Security

IBM Mobile Security

Page 2: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

2© 2015 IBM Corporation

by 2017Mobile downloadswill increase to

268 billionGartner

by 2016The number of smartphone users worldwide will surpass

2 billioneMarketer

Enterprise mobile trends

“Enterprise mobility will continue to be one of the hottest topics in IT,and high on the list of priorities for all CIOs.”

Ovum

“IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.”

IDC

Page 3: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

3© 2015 IBM Corporation

387new threats every minute or more than six every secondMcAfee

As mobile grows, so do security threats

“With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory.”

Gartner

“Enterprise mobility… new systems of engagement.These new systems help firms empower their customers, partners,

and employees with context-aware apps and smart products.”Forrester

Arxan

Top mobile devicesand apps hacked 97% Android

87% iOS

Page 4: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

4© 2015 IBM Corporation

What concerns does this create for the enterprise?

Source: 2014 Information Security Media Group Survey, “The State of Mobile Security Maturity”

32% are concerned about fraudulent transactions

Only 18% can detect malware / jailbreaks

52% worry aboutapplication vulnerabilities

Only 23% have tamper-proofing capabilities

50% are content and data leakage are their top security concern

60% use secure containersfor data security

57% say a lost or stolen device is top concern

60% use passcodesfor device security

Page 5: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

5© 2015 IBM Corporation

MobileFirstProtect (MaaS360)

AppScan, Arxan, Trusteer M; bile SDK

IBM Mobile Security Framework

AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana

HP Fortify, Veracode, Proguard CA, Oracle, RSA

• Manage multi-OS BYOD environment

• Mitigate risks of lost and compromised devices

• Separate enterprise and personal data

• Enforce compliance with security policies

• Distribute and control enterprise apps

• Build and secure apps and protect them “in the wild”

• Provide secure web, mobile, API access and identify device risk

• Meet authentication ease-of-use expectation

Extend Security Intelligence

• Extend security information and event management (SIEM) to mobile platform• Incorporate mobile log management, anomaly detection, configuration and vulnerability management

Manage Access and Fraud

Safeguard Applications and Data

Secure Content and Collaboration

Protect Devices

Page 6: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

6© 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

Page 7: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

7© 2015 IBM Corporation

IBM Mobile Security Speaker Panel

Anar TaoriPrincipal Offering Manager for IBM MaaS360

Shaked VaxTrusteer Products Strategist

Brian MulliganOffering Manager, IBM Security Access and Directory

David MarshakSenior Product Manager, Application Security

Jason HardyWW Market Segment Manager, Mobile Security

Page 8: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

8© 2015 IBM Corporation

MobileFirstProtect (MaaS360)

AppScan, Arxan, Trusteer M; bile SDK

IBM Mobile Security Framework

AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana

HP Fortify, Veracode, Proguard CA, Oracle, RSA

• Manage multi-OS BYOD environment

• Mitigate risks of lost and compromised devices

• Separate enterprise and personal data

• Enforce compliance with security policies

• Distribute and control enterprise apps

• Build and secure apps and protect them “in the wild”

• Provide secure web, mobile, API access and identify device risk

• Meet authentication ease-of-use expectation

Extend Security Intelligence

• Extend security information and event management (SIEM) to mobile platform• Incorporate mobile log management, anomaly detection, configuration and vulnerability management

Manage Access and Fraud

Safeguard Applications and Data

Secure Content and Collaboration

Protect Devices

Page 9: Take an Integrated Approach to Mobile Security & Address the Full Breadth of Threats

© 2015 IBM Corporation

Follow me on social media…Jason E HardyWorldwide Market Segment Manager, Mobile SecurityIBM Security

Twitter: jehardy01LinkedIn: www.linkedin.com/in/JasonEHardy

Interested in updates from IBM Mobile Security?