SlideShare a Scribd company logo
1 of 22
Download to read offline
Knock, Knock…The Internet of Things
wants to come in?
Ralph Huenten
Security
CA Technologies
Security Presales - EMEA
SCT31T
@casecurity
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
The Internet of Things (IoT) will connect users to
the enterprise or just connect to the enterprise
independently — but what will be used to
secure this access? Come see how CA Security
can secure access to and from the IoT.
Ralph
Huenten
CA Technologies
Advisor
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Digital transformation is underway
Half of enterprises today say the application economy is significantly disrupting their
industry—while 44% say it is doing the same to their own organization 1
-- CA Technologies with Vanson Bourne
1.75B
smartphone users in
2014 1
25
Business apps per
device2
50B
Connected devices
(IoT) by 2020 3
>$100B
in cloud spending
this year 4
Sources:
1. CA Vanson Bourne Study
2. eMarketer study
3. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013
4. GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
This drives the need for increased Security
Security concerns - the top
obstacle in app economy#1
$12.7M
Average cost to the
company for a breach
Overall IT spend
devoted to Security
over next 3 years
>25%
2
78%
Increase in # of breached
records from 2013 to 20143
16,856
Number of attacks the
average company had
in 2013
1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 2014
2. The 2014 Cost of Cyber Crime Study Reveals Increased Risks, Oct, 2014
3. http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IoT Represents the Next Wave of Risk
The Internet of Things (IoT) will connect users to the enterprise or just connect to the
enterprise independently — but what will be used to secure this access?
• How will users authenticate to
the IoT devices?
• How will IoT devices
authenticate to the enterprise?
50B
Connected devices
(IoT) by 2020 3
IoT Devices The EnterpriseUsers
• What types of data can the IoT
devices access?
• What types of transactions can
the IoT devices perform?
What happens to the IoT device if it is hacked?
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Solution
 Components:
– CA API Gateway
 used to secure communications between users and IoT devices and
between IoT devices and the enterprise.
– CA Advanced Authentication
 used to authenticate users to IoT devices and IoT devices to the enterprise.
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Solution Conceptual Architecture
CA API Gateway
CA Advanced
Authentication
IoT Devices The EnterpriseUsers
Secures Communications
Between users, IoT, and Enterprise
Provides MFA and
risk analysis for
authentication
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
CA Security Innovation Demo
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Users Enroll using
Demo iPad/laptop or
their own device
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Demo supports direct enrollment
or social media registration
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
During direct enrollment, user is prompted to
enter First Name, Last Name, ID and password.
This data is used to create an account in CA
Advanced Authentication.
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Users can then click to
Start Test Drive
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
User is prompted to login using User ID
/ Password, which is then validated by
CA Advanced Authentication.
The demo can support
• Basic with/without risk authentication
• CA Auth ID with/without risk authentication
• CA Mobile OTP with/without risk authentication
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Once authenticated, the gateway will release the
request to start slot car engine to CloudMQTT,
which will determine which slot car is currently
available and place the request in that queue.
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
Raspberry periodically checks with CloudMQTT
for new requests, and will turn on power to the
correct car when a new request is retrieved.
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race TrackAt end of Test Drive, users can
select to Stop Engine, which
will also disable their account
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Summary
 Authentication
– User access to IoT devices can be protected by CA Adv. Authentication
using MFA credentials and/or Risk-Based Authentication
 Orchestration
– Communications between users, web/mobile apps, IoT devices, and CA
Adv. Auth servers can be orchestrated by CA API Gateway
– The gateway also provides protocol translation where necessary
CA SECURITY FOR THE INTERNET OF THINGS
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCT05S Roadmap: CA Advanced Authentication and CA SSO Wed. Nov 18 at 4:30 pm
SCT24T
Mobile Risk Analysis: Take Your Mobile App Security to
the Next Level
Thurs. Nov 19 at 1:00 pm
SCT21T Enable Omnichannel with Security and API Management Thurs. Nov 19 at 2:00 pm
SCT17T Strong Auth in IdM Thurs. Nov 19 at 3:45 pm
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Protect Against
Fraud & Breaches
CA Advanced Auth
Security Theater
Engage
Customers
CA SSO
Security Theater
Innovation – IoT
Slot Car
CA AA, APIM
Security Theater
Secure Omni-
Channel Access
CA AA, APIM, SSO
Security Theater
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services OrchestratorCA Technologies
 
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...CA Technologies
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...CA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box CA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Continuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsContinuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsCA Technologies
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMCA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 
A Week in the Life (of DevOps)
A Week in the Life (of DevOps)A Week in the Life (of DevOps)
A Week in the Life (of DevOps)CA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...CA Technologies
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionCA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentCA Technologies
 

What's hot (20)

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Continuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsContinuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOps
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSM
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
A Week in the Life (of DevOps)
A Week in the Life (of DevOps)A Week in the Life (of DevOps)
A Week in the Life (of DevOps)
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication Solution
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App Development
 

Viewers also liked

Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupScaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupCA Technologies
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueCA Technologies
 
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...intasave-caribsavegroup
 
Revelation 12
Revelation 12Revelation 12
Revelation 12pegbaker
 
Mandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansMandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansNAP Events
 
Animal Project: Dr. Terdal
Animal Project: Dr. TerdalAnimal Project: Dr. Terdal
Animal Project: Dr. TerdalAnam Ashraf
 
Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences NAP Events
 
BiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyBiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyJonathan Eisen
 
Journalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefJournalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefGary Schroeder
 
Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Jessica Laccetti
 
Digital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planDigital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planiktplan
 
Opphavsrett multippel choice
Opphavsrett multippel choiceOpphavsrett multippel choice
Opphavsrett multippel choiceiktplan
 
Turismo natureza
Turismo natureza  Turismo natureza
Turismo natureza kyzinha
 
Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Wilmer68
 
The History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousThe History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousSentient Decision Science
 

Viewers also liked (19)

Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupScaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business Value
 
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
 
Revelation 12
Revelation 12Revelation 12
Revelation 12
 
Ciencia
CienciaCiencia
Ciencia
 
Mandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansMandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation Plans
 
Animal Project: Dr. Terdal
Animal Project: Dr. TerdalAnimal Project: Dr. Terdal
Animal Project: Dr. Terdal
 
Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences
 
Trastornos psicológicos-psquiatricos
Trastornos psicológicos-psquiatricosTrastornos psicológicos-psquiatricos
Trastornos psicológicos-psquiatricos
 
BiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyBiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring Novelty
 
Journalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefJournalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis Brief
 
Victorian Climate Change Adaptation Plan
Victorian Climate Change Adaptation PlanVictorian Climate Change Adaptation Plan
Victorian Climate Change Adaptation Plan
 
Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012
 
Digital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planDigital dømmekraft - IKT-plan
Digital dømmekraft - IKT-plan
 
Opphavsrett multippel choice
Opphavsrett multippel choiceOpphavsrett multippel choice
Opphavsrett multippel choice
 
Turismo natureza
Turismo natureza  Turismo natureza
Turismo natureza
 
Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación
 
The History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousThe History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-Conscious
 
Independent and Outside Directors
Independent and Outside DirectorsIndependent and Outside Directors
Independent and Outside Directors
 

Similar to Knock, Knock…The Internet of Things wants to come in?

Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCA Technologies
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...CA Technologies
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeWebinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...CA Technologies
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementCA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementCA Technologies
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersCA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...CA Technologies
 

Similar to Knock, Knock…The Internet of Things wants to come in? (20)

Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OS
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeWebinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API Management
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Knock, Knock…The Internet of Things wants to come in?

  • 1. Knock, Knock…The Internet of Things wants to come in? Ralph Huenten Security CA Technologies Security Presales - EMEA SCT31T @casecurity #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? Come see how CA Security can secure access to and from the IoT. Ralph Huenten CA Technologies Advisor
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Digital transformation is underway Half of enterprises today say the application economy is significantly disrupting their industry—while 44% say it is doing the same to their own organization 1 -- CA Technologies with Vanson Bourne 1.75B smartphone users in 2014 1 25 Business apps per device2 50B Connected devices (IoT) by 2020 3 >$100B in cloud spending this year 4 Sources: 1. CA Vanson Bourne Study 2. eMarketer study 3. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013 4. GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD This drives the need for increased Security Security concerns - the top obstacle in app economy#1 $12.7M Average cost to the company for a breach Overall IT spend devoted to Security over next 3 years >25% 2 78% Increase in # of breached records from 2013 to 20143 16,856 Number of attacks the average company had in 2013 1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 2014 2. The 2014 Cost of Cyber Crime Study Reveals Increased Risks, Oct, 2014 3. http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IoT Represents the Next Wave of Risk The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? • How will users authenticate to the IoT devices? • How will IoT devices authenticate to the enterprise? 50B Connected devices (IoT) by 2020 3 IoT Devices The EnterpriseUsers • What types of data can the IoT devices access? • What types of transactions can the IoT devices perform? What happens to the IoT device if it is hacked?
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Solution  Components: – CA API Gateway  used to secure communications between users and IoT devices and between IoT devices and the enterprise. – CA Advanced Authentication  used to authenticate users to IoT devices and IoT devices to the enterprise.
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Solution Conceptual Architecture CA API Gateway CA Advanced Authentication IoT Devices The EnterpriseUsers Secures Communications Between users, IoT, and Enterprise Provides MFA and risk analysis for authentication
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track CA Security Innovation Demo
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Users Enroll using Demo iPad/laptop or their own device CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Demo supports direct enrollment or social media registration CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo During direct enrollment, user is prompted to enter First Name, Last Name, ID and password. This data is used to create an account in CA Advanced Authentication. CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Users can then click to Start Test Drive CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo User is prompted to login using User ID / Password, which is then validated by CA Advanced Authentication. The demo can support • Basic with/without risk authentication • CA Auth ID with/without risk authentication • CA Mobile OTP with/without risk authentication CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Once authenticated, the gateway will release the request to start slot car engine to CloudMQTT, which will determine which slot car is currently available and place the request in that queue. CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track Raspberry periodically checks with CloudMQTT for new requests, and will turn on power to the correct car when a new request is retrieved.
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race TrackAt end of Test Drive, users can select to Stop Engine, which will also disable their account
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Summary  Authentication – User access to IoT devices can be protected by CA Adv. Authentication using MFA credentials and/or Risk-Based Authentication  Orchestration – Communications between users, web/mobile apps, IoT devices, and CA Adv. Auth servers can be orchestrated by CA API Gateway – The gateway also provides protocol translation where necessary CA SECURITY FOR THE INTERNET OF THINGS
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCT05S Roadmap: CA Advanced Authentication and CA SSO Wed. Nov 18 at 4:30 pm SCT24T Mobile Risk Analysis: Take Your Mobile App Security to the Next Level Thurs. Nov 19 at 1:00 pm SCT21T Enable Omnichannel with Security and API Management Thurs. Nov 19 at 2:00 pm SCT17T Strong Auth in IdM Thurs. Nov 19 at 3:45 pm
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Protect Against Fraud & Breaches CA Advanced Auth Security Theater Engage Customers CA SSO Security Theater Innovation – IoT Slot Car CA AA, APIM Security Theater Secure Omni- Channel Access CA AA, APIM, SSO Security Theater
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15