SlideShare a Scribd company logo
1 of 34
SESSION ID:
#RSAC
Michelle Waugh
Security in the App Economy
How to Ride the Wave Without Wiping Out!
SPO1-W02
Vice President, Security Solutions
CA Technologies
Are you rolling out new apps & services to your customers?
Are you using security to improve customer engagement?
Are you leveraging security to enable and drive business?
Have you had a breach in the last year -as far as you know?
#RSAC
Today, Every Company is a Software Company.
Are You?
6
From sneaker company to
data enabled athletic
brand.
From book seller to insight driven
delivery service, cloud servicer and
entertainment hub.
From UK Grocer to global consumer
retailer leveraging data and technology
that reframes the shopper experience.
In 2014, CEOs must focus on leading their organizations to think like and become
more like “tech” companies, because within a few years, digital business capabilities
will dominate every industry. Urgent action is needed because first-mover advantage
is common in digital business, and fast followers must be very fast.
Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
#RSAC
7
#RSAC
Traditional Approach to Security
#RSAC#RSAC
Security in the Open Enterprise
#RSAC
Ripped from the Headlines
#RSAC
Security concerns the top
obstacle in app economy#1
-- CA Technologies with Vanson Bourne
Overall IT spend
devoted to Security
over next 3 years
>25%
Leaders saw revenue
increase for security-
enabled services
(18% of Laggards)
47%
Security priority for
business is improving
mobile experience
#2
Increase in
breaches YoY from
2013 to 2014
78%
#RSAC
Security
#RSAC
Application Economy Requires Identity-centric Security
11
IDENTITY - CENTRIC
SECURITY
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
#RSAC
12
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
13
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
#RSAC
#RSAC
Simplify Anywhere, Anything Access
14
CUSTOMERS, EMPLOYEES, PARTNERS
Mobile
Apps
APIs/Web
Services
Web
Apps
From the
Cloud On-Premise
On
Device
Enable access from
any device
Coordinate security across
Web, mobile, APIs
Improve customer
adoption/experience/
loyalty
What you
need to do
#RSAC
The Application Economy is Driving the Rapid
Adoption of Mobile Applications
15
“By 2020, more than 63% of enterprises
expect their desktops to be replaced by
mobile devices connected to the network via
office wireless LAN”
Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales,
14 May 2014
79%of organizations are using SaaS
Sources: Ponemon Institute.
#RSAC
Enabling your Mobile Workforce is a Journey
Web API
Native AppWeb-App
Existing Web
Applications
New Native
App Projects
Unified
Access
Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
#RSAC
IAM + API Solution Enables Fast, Secure
Mobile Delivery of Enterprise Applications
17
Identity Manager
Cloud Apps
On-Premises Enterprise Apps
CA SSO ( SiteMinder ) / LDAP / IdP
CA Mobile API
Gateway
Paul Pronsati
EVP, Global Business Ops & CIO
BENEFITS
 Common standard
across platforms and
applications
 Improves developer
velocity and time to
value
 Application user and
device level security
OAUTH/API
SAML
SAML
SAML
CA Mobile
API Gateway
CA SSO
{SiteMinder} /
LDAP/ldP
On-Premises
Enterprise Apps
Identity Manager
#RSAC
Lessons in Mobility
18
 Begin with the user experience as the focus. Is login required?
 Review and define your architecture holistically; be prepared to move fast!
 Choose the app type that fits your use case and objective and implement a
solution that combines usability and security (native app SSO + web)
 Leverage your existing SSO implementation to improve the experience
 Engage the business now around what SaaS projects are coming up and
position the enterprise friendly vendors…say “yes” to BYOA
 Start thinking beyond front door access for SaaS
#RSAC
19
What you
need to be
thinking
about
#RSAC
PROTECT DATA WHILE
ENABLING BUSINESS
#RSAC
Security – By the Numbers
RECORDS
BREACHED IN 20141,023,108,267
NUMBER OF
BREACH INCIDENTS1,541 BREACHED RECORDS
INCREASE FROM LAST YEAR78%
Data records were lost or stolen with the following frequency
Every Day
2,803,036
Every Hour
116,793
Every Minute
1,947
Every Second
32
#RSAC
Protect Data While Enabling Business
21
 Device
 Geolocation
 Velocity
 User history
 Fraud patterns
PROTECT MOBILE
APP
STRONGLY
AUTHENTICATE
USERS
CONTROL ACCESS
TO WEB APPS
CONTROL ACCESS
TO APIS
SECURE
PRIVILEGED
IDENTITIES
Enable security from
end-to-end
Protect against insider threats
Defend against
external threats
What you
need to do
#RSAC
Combat Insider Threats and External Attacks
Systems
Data
Administrators
Employees
INSIDERS
CUSTOMERS
Web Apps
Strong,Risk-based
Authentication
Privileged
Identity
SSO with Session
Assurance
EXTERNAL
THREATS
BUSINESS VALUE
 Reduced risk of breach through fine-grained admin controls,
hypervisor security, and shared account management.
 Increase security and customer trust with strong, risk-aware
authentication
 Protect against session hijacking with unique session
assurance
PROOF POINTS
 CA Privileged Identity Manager is the ONLY solution that helps secure
critical systems at the OS kernel level
 CA PIM is protecting the systems at 9 out of the top 16 Fortune 25
companies
 CA Advanced Authentication enabled 64% of surveyed companies
improve their user experience
REQUIRED
CAPABILITIES
PIM
Advanced Authentication
SSO
#RSAC
Lessons in protecting your business
23
 Perimeter security is necessary, but not sufficient. You need to think end-to-
end and defend from the inside-out
 Think about your identities. Do your accounts have the right privileges?
Who certified access? Do you have orphaned accounts?
 Nearly all of the most damaging attacks use a privileged identity – focus
your attention here!
 Don’t think of insider threats as purely malicious employees: they can be
targeted with social engineering or can be careless
 Additional security doesn’t have to make the user experience more difficult.
Risk-awareness is essential - security gets applies only where needed
#RSAC
24
What you
need to be
thinking
about
#RSAC
EXTEND BUSINESS
WITH SECURITY
#RSAC
EXTENDING BUSINESS WITH SECURITY
25
Reduce infrastructure
Drive agility into the
business
Reduce need for
security expertise
What you
need to do
IDENTITY
AS A
SERVICE
#RSAC
26
170
Countries
6,500
Corporate & public
sector customers
3 million+
Direct customers
#RSAC
#RSAC
27
#RSAC
FOCUS ON CORE COMPETENCY
Our advice
Seek security expertise
BT’s approach
• Ensure they have depth and breadth of experience in
delivering service
• Remain engaged with your partner security expert
• Provide in-depth defence and incident response
• Around-the-clock protection from cyber threats
• Understand risks as organisation changes – when new
technologies are introduced, new vulnerabilities
presented
• Provide secure access to all remote and mobile workers
#RSAC
Lessons in Identity & Access as a Service
28
 Enable the business to outsource IT Security to managed services
and focus on your true business
 Become the identity provider for external as well as internal users
 Secure identity and access from end to end – from the device, user,
application, transmission, and though to the data source
#RSAC
29
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
Security Spend Must do More than Just Secure
30
Sell the business on business value
PROTECT THE BUSINESS
UNLEASH THE BUSINESS
Secure access
to on-premise
and cloud
applications
Govern user
access across
enterprise
Protect against
insider threats
and external
attacks
Accelerate
the delivery
of secure
apps
Deliver multi-
channel –
from Web to
Mobile to APIs
Enable bring
your own
identity
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
Success is the result of right choices.
Choose your waves wisely.
Unknown surfer, March, 2015
#RSAC
32
This is business,
rewritten by software™
#RSAC
#RSAC
Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks
and logos referenced herein belong to their respective companies.
This document is for your informational purposes only. CA assumes no responsibility
for the accuracy or completeness of the information. To the extent permitted by
applicable law, CA provides this document “as is” without warranty of any kind,
including, without limitation, any implied warranties of merchantability, fitness for a
particular purpose, or non-infringement. In no event will CA be liable for any loss or
damage, direct or indirect, from the use of this document, including, without
limitation, lost profits, business interruption, goodwill or lost data, even if CA is
expressly advised in advance of the possibility of such damages.
Thank You
#RSAC
For More Information
To learn more about Security,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlay
from following “More Info Graphics” slide here;
ensure it links to correct page
Security

More Related Content

What's hot

Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 

What's hot (20)

Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 

Similar to Security in the App Economy: How to Ride the Wave Without Wiping Out!

_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small BusinessesInstasafe1
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitecturePriyanka Aash
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfinsightssuccess2
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesSentronex
 
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting
 
Cyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCRI Advantage
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)IndusfacePvtLtd
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 

Similar to Security in the App Economy: How to Ride the Wave Without Wiping Out! (20)

_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial Services
 
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
 
Cyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCyber Security Testing – CRI Advantage
Cyber Security Testing – CRI Advantage
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
IT solution
IT solutionIT solution
IT solution
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Fix nix Pitch
Fix nix PitchFix nix Pitch
Fix nix Pitch
 
Ciso executive workshop
Ciso executive workshopCiso executive workshop
Ciso executive workshop
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Security in the App Economy: How to Ride the Wave Without Wiping Out!

  • 1. SESSION ID: #RSAC Michelle Waugh Security in the App Economy How to Ride the Wave Without Wiping Out! SPO1-W02 Vice President, Security Solutions CA Technologies
  • 2. Are you rolling out new apps & services to your customers?
  • 3. Are you using security to improve customer engagement?
  • 4. Are you leveraging security to enable and drive business?
  • 5. Have you had a breach in the last year -as far as you know?
  • 6. #RSAC Today, Every Company is a Software Company. Are You? 6 From sneaker company to data enabled athletic brand. From book seller to insight driven delivery service, cloud servicer and entertainment hub. From UK Grocer to global consumer retailer leveraging data and technology that reframes the shopper experience. In 2014, CEOs must focus on leading their organizations to think like and become more like “tech” companies, because within a few years, digital business capabilities will dominate every industry. Urgent action is needed because first-mover advantage is common in digital business, and fast followers must be very fast. Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
  • 8. #RSAC#RSAC Security in the Open Enterprise
  • 10. #RSAC Security concerns the top obstacle in app economy#1 -- CA Technologies with Vanson Bourne Overall IT spend devoted to Security over next 3 years >25% Leaders saw revenue increase for security- enabled services (18% of Laggards) 47% Security priority for business is improving mobile experience #2 Increase in breaches YoY from 2013 to 2014 78% #RSAC Security
  • 11. #RSAC Application Economy Requires Identity-centric Security 11 IDENTITY - CENTRIC SECURITY Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 12. #RSAC 12 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 13. #RSAC 13 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS #RSAC
  • 14. #RSAC Simplify Anywhere, Anything Access 14 CUSTOMERS, EMPLOYEES, PARTNERS Mobile Apps APIs/Web Services Web Apps From the Cloud On-Premise On Device Enable access from any device Coordinate security across Web, mobile, APIs Improve customer adoption/experience/ loyalty What you need to do
  • 15. #RSAC The Application Economy is Driving the Rapid Adoption of Mobile Applications 15 “By 2020, more than 63% of enterprises expect their desktops to be replaced by mobile devices connected to the network via office wireless LAN” Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales, 14 May 2014 79%of organizations are using SaaS Sources: Ponemon Institute.
  • 16. #RSAC Enabling your Mobile Workforce is a Journey Web API Native AppWeb-App Existing Web Applications New Native App Projects Unified Access Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
  • 17. #RSAC IAM + API Solution Enables Fast, Secure Mobile Delivery of Enterprise Applications 17 Identity Manager Cloud Apps On-Premises Enterprise Apps CA SSO ( SiteMinder ) / LDAP / IdP CA Mobile API Gateway Paul Pronsati EVP, Global Business Ops & CIO BENEFITS  Common standard across platforms and applications  Improves developer velocity and time to value  Application user and device level security OAUTH/API SAML SAML SAML CA Mobile API Gateway CA SSO {SiteMinder} / LDAP/ldP On-Premises Enterprise Apps Identity Manager
  • 18. #RSAC Lessons in Mobility 18  Begin with the user experience as the focus. Is login required?  Review and define your architecture holistically; be prepared to move fast!  Choose the app type that fits your use case and objective and implement a solution that combines usability and security (native app SSO + web)  Leverage your existing SSO implementation to improve the experience  Engage the business now around what SaaS projects are coming up and position the enterprise friendly vendors…say “yes” to BYOA  Start thinking beyond front door access for SaaS
  • 19. #RSAC 19 What you need to be thinking about #RSAC PROTECT DATA WHILE ENABLING BUSINESS
  • 20. #RSAC Security – By the Numbers RECORDS BREACHED IN 20141,023,108,267 NUMBER OF BREACH INCIDENTS1,541 BREACHED RECORDS INCREASE FROM LAST YEAR78% Data records were lost or stolen with the following frequency Every Day 2,803,036 Every Hour 116,793 Every Minute 1,947 Every Second 32
  • 21. #RSAC Protect Data While Enabling Business 21  Device  Geolocation  Velocity  User history  Fraud patterns PROTECT MOBILE APP STRONGLY AUTHENTICATE USERS CONTROL ACCESS TO WEB APPS CONTROL ACCESS TO APIS SECURE PRIVILEGED IDENTITIES Enable security from end-to-end Protect against insider threats Defend against external threats What you need to do
  • 22. #RSAC Combat Insider Threats and External Attacks Systems Data Administrators Employees INSIDERS CUSTOMERS Web Apps Strong,Risk-based Authentication Privileged Identity SSO with Session Assurance EXTERNAL THREATS BUSINESS VALUE  Reduced risk of breach through fine-grained admin controls, hypervisor security, and shared account management.  Increase security and customer trust with strong, risk-aware authentication  Protect against session hijacking with unique session assurance PROOF POINTS  CA Privileged Identity Manager is the ONLY solution that helps secure critical systems at the OS kernel level  CA PIM is protecting the systems at 9 out of the top 16 Fortune 25 companies  CA Advanced Authentication enabled 64% of surveyed companies improve their user experience REQUIRED CAPABILITIES PIM Advanced Authentication SSO
  • 23. #RSAC Lessons in protecting your business 23  Perimeter security is necessary, but not sufficient. You need to think end-to- end and defend from the inside-out  Think about your identities. Do your accounts have the right privileges? Who certified access? Do you have orphaned accounts?  Nearly all of the most damaging attacks use a privileged identity – focus your attention here!  Don’t think of insider threats as purely malicious employees: they can be targeted with social engineering or can be careless  Additional security doesn’t have to make the user experience more difficult. Risk-awareness is essential - security gets applies only where needed
  • 24. #RSAC 24 What you need to be thinking about #RSAC EXTEND BUSINESS WITH SECURITY
  • 25. #RSAC EXTENDING BUSINESS WITH SECURITY 25 Reduce infrastructure Drive agility into the business Reduce need for security expertise What you need to do IDENTITY AS A SERVICE
  • 26. #RSAC 26 170 Countries 6,500 Corporate & public sector customers 3 million+ Direct customers #RSAC
  • 27. #RSAC 27 #RSAC FOCUS ON CORE COMPETENCY Our advice Seek security expertise BT’s approach • Ensure they have depth and breadth of experience in delivering service • Remain engaged with your partner security expert • Provide in-depth defence and incident response • Around-the-clock protection from cyber threats • Understand risks as organisation changes – when new technologies are introduced, new vulnerabilities presented • Provide secure access to all remote and mobile workers
  • 28. #RSAC Lessons in Identity & Access as a Service 28  Enable the business to outsource IT Security to managed services and focus on your true business  Become the identity provider for external as well as internal users  Secure identity and access from end to end – from the device, user, application, transmission, and though to the data source
  • 29. #RSAC 29 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 30. #RSAC Security Spend Must do More than Just Secure 30 Sell the business on business value PROTECT THE BUSINESS UNLEASH THE BUSINESS Secure access to on-premise and cloud applications Govern user access across enterprise Protect against insider threats and external attacks Accelerate the delivery of secure apps Deliver multi- channel – from Web to Mobile to APIs Enable bring your own identity Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 31. Success is the result of right choices. Choose your waves wisely. Unknown surfer, March, 2015
  • 32. #RSAC 32 This is business, rewritten by software™ #RSAC
  • 33. #RSAC Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. Thank You
  • 34. #RSAC For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page Security