Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
© 2015 IBM Corporation
IBM Security
0 IBM Security Systems© 2015 IBM Corporation
2015 Mobile Security Trends:
Are You Read...
© 2015 IBM Corporation
IBM Security
1 IBM Security Systems
Agenda
 What’s Happening in Mobile
 Introduce the IBM Mobile ...
© 2015 IBM Corporation
IBM Security
2 IBM Security Systems
“Enterprise mobility will continue to
be one of the hottest top...
© 2015 IBM Corporation
IBM Security
3 IBM Security Systems
3
Mobile Enterprise: A 2015 HorizonWatching Trend Report
“Mobil...
© 2015 IBM Corporation
IBM Security
4 IBM Security Systems
Mobile Security Threats Are Exploding
Mobile malware is
growing...
© 2015 IBM Corporation
IBM Security
5 IBM Security Systems
Are Mobile Enterprise Apps Secure?
© 2015 IBM Corporation
IBM Security
6 IBM Security Systems
MobileFirst
Protect (MaaS360)
AppScan, Arxan, Trusteer M;
bile ...
© 2015 IBM Corporation
IBM Security
7 IBM Security Systems
The Roadmap to Effective Mobile Security
The State of Mobile Se...
© 2015 IBM Corporation
IBM Security
8 IBM Security Systems
Tackling Mobile Security with a
Layered Defense
David Lingenfel...
© 2015 IBM Corporation
IBM Security
9 IBM Security Systems
Layered Defense
© 2015 IBM Corporation
IBM Security
10 IBM Security Systems
Change is inevitable
© 2015 IBM Corporation
IBM Security
11 IBM Security Systems
Mobile technologies are more empowering
of employed adults use...
© 2015 IBM Corporation
IBM Security
12 IBM Security Systems
But security threats are even greater
Threats on your
employee...
© 2015 IBM Corporation
IBM Security
13 IBM Security Systems
Relentless Use
of Multiple Methods
Operational
Sophistication
...
© 2015 IBM Corporation
IBM Security
14 IBM Security Systems
IT’s Role and Focus has Changed
Many different
use cases withi...
© 2015 IBM Corporation
IBM Security
15 IBM Security Systems
Mobility Is Strategic
Enterprise Mobility Management
has becom...
© 2015 IBM Corporation
IBM Security
16 IBM Security Systems
IBM MobileFirst Protect Layered Approach
Secure
the Device
Sec...
© 2015 IBM Corporation
IBM Security
17 IBM Security Systems
Secure the Device
Dynamic security and
compliance features
con...
© 2015 IBM Corporation
IBM Security
18 IBM Security Systems
Secure the Container: Mail & Content
An office productivity ap...
© 2015 IBM Corporation
IBM Security
19 IBM Security Systems
Secure the App
Enhancing private and public app
security throu...
© 2015 IBM Corporation
IBM Security
20 IBM Security Systems
Secure the Network
A fully-functional web browser
to enable se...
© 2015 IBM Corporation
IBM Security
21 IBM Security Systems
IBM MobileFirst Protect Delivers an Integrated Approach
One Pl...
© 2015 IBM Corporation
IBM Security
22 IBM Security Systems
Embrace The New Normal
Mobile is becoming THE IT platform
Go b...
© 2015 IBM Corporation
IBM Security
23 IBM Security Systems
Wrap-up
 Unlocking productivity with Apps and Content
 Capab...
© 2015 IBM Corporation
IBM Security
24 IBM Security Systems
www.ibm.com/security
© Copyright IBM Corporation 2015. All rig...
Upcoming SlideShare
Loading in …5
×

2015 Mobile Security Trends: Are You Ready?

7,733 views

Published on

We’ve been hearing for years now that mobile security threats are coming into their own, both in terms of volume and capacity to inflict harm. Is 2015 the year when organizations will move past their fundamental BYOD debates and start discussing more progressive mobile security topics? Securing the mobile enterprise requires a comprehensive approach that includes securing devices, protecting data, safeguarding applications, and managing access and fraud.

In this session, hear IBM Security experts discuss:

- The latest mobile security trends and challenges
- Real-life customer experiences
- Best practices on building your overall mobile security strategy

View on-demand recording: http://securityintelligence.com/events/2015-mobile-security-trends/

Published in: Technology
  • For data visualization,data analytics,data intelligence and ERP Tools, online training with job placements, register at http://www.todaycourses.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

2015 Mobile Security Trends: Are You Ready?

  1. 1. © 2015 IBM Corporation IBM Security 0 IBM Security Systems© 2015 IBM Corporation 2015 Mobile Security Trends: Are You Ready? Jason Hardy Market Segment Manager, Mobile Security IBM Security Systems David Lingenfelter Information Security Officer, MaaS360 by Fiberlink IBM Security
  2. 2. © 2015 IBM Corporation IBM Security 1 IBM Security Systems Agenda  What’s Happening in Mobile  Introduce the IBM Mobile Security Framework  Trends from “The State of Mobile Security Maturity”  Tackling Mobile Security with a Layered Defense 1
  3. 3. © 2015 IBM Corporation IBM Security 2 IBM Security Systems “Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.” “IT organizations will dedicate at least 25% of their software budget to mobile application development, deployment, and management by 2017.” Enterprise Mobility is HOT Mobile Security is a CHALLENGE
  4. 4. © 2015 IBM Corporation IBM Security 3 IBM Security Systems 3 Mobile Enterprise: A 2015 HorizonWatching Trend Report “Mobile reached a tipping point in 2014 as it solidified its position as one of the most disruptive technologies for businesses in decades. Not since the advent of the Internet has a technology forced businesses to rethink completely how they win, serve, and retain customers. The new competitive battleground is the mobile moment.” Forrester “Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs” Ovum Interest in Mobile continues to grow as business professionals are increasingly using their mobile device over traditional laptops GSMA “Mobility spending plans are trending up, with 73% of companies planning to increase mobility spending over the next 12 months, 25% planning to spend at the same rate, and only 2% planning to spend less.” Current Analysis “Gartner studies show that mobile devices are increasingly becoming the first go-to device for communications and content consumption used by most people on the planet who can afford such devices” Gartner
  5. 5. © 2015 IBM Corporation IBM Security 4 IBM Security Systems Mobile Security Threats Are Exploding Mobile malware is growing; malicious code is infecting more than 11.6 million mobile devices at any given time3 Mobile devices and the apps we rely on are under attack 90% of the top mobile apps have been hacked4 “With the growing penetration of mobile devices in the enterprise, security testing and protection of mobile applications and data become mandatory ` Gartner “Enterprise mobility … new systems of engagement. These new systems help firms empower their customers, partners, and employees with context-aware apps and smart products.” Forrester
  6. 6. © 2015 IBM Corporation IBM Security 5 IBM Security Systems Are Mobile Enterprise Apps Secure?
  7. 7. © 2015 IBM Corporation IBM Security 6 IBM Security Systems MobileFirst Protect (MaaS360) AppScan, Arxan, Trusteer M; bile SDK Security Access Manager for Mobile, Trusteer Pinpoint Extend Security Intelligence Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Protect Content & Data Safeguard Applications Manage Access & Fraud Secure the Device DATA Personal and Consumer Enterprise IBM Mobile Security Framework QRadar Security Intelligence Platform AirWatch, MobileIron, Good, Citrix, Microsoft, Mocana HP Fortify, Veracode, Proguard CA, Oracle, RSA Secure the Device Protect Content & Data Safeguard Applications Manage Access & Fraud Provision, manage and secure Corporate and BYOD devices Segregate enterprise and personal data; ensure shared content is protected Develop secure, vulnerability free, hardened and risk aware applications Secure access and transactions for customers, partners and employees Security Intelligence A unified architecture for integrating mobile security information & event management (SIEM), log management, anomaly detection, and configuration & vulnerability management
  8. 8. © 2015 IBM Corporation IBM Security 7 IBM Security Systems The Roadmap to Effective Mobile Security The State of Mobile Security Maturity Findings from the ISMG Survey Sponsored by IBM Link to report
  9. 9. © 2015 IBM Corporation IBM Security 8 IBM Security Systems Tackling Mobile Security with a Layered Defense David Lingenfelter @Simply_Security
  10. 10. © 2015 IBM Corporation IBM Security 9 IBM Security Systems Layered Defense
  11. 11. © 2015 IBM Corporation IBM Security 10 IBM Security Systems Change is inevitable
  12. 12. © 2015 IBM Corporation IBM Security 11 IBM Security Systems Mobile technologies are more empowering of employed adults use at least one personally-owned mobile device for business Mobile workers will use at least one business-focused app this year yearly increase in revenue from people using mobile devices to purchase items.
  13. 13. © 2015 IBM Corporation IBM Security 12 IBM Security Systems But security threats are even greater Threats on your employees Threats on your customers of financial apps on Android have been hacked of Top 100 Android apps have been hacked annual cost of crime
  14. 14. © 2015 IBM Corporation IBM Security 13 IBM Security Systems Relentless Use of Multiple Methods Operational Sophistication Near Daily Leaks of Sensitive Data Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014 IBM X-Force declared Year of the Security Breach 40% increase in reported data breaches and incidents 500,000,000+ records were leaked, while the future shows no sign of change 2011 2012 2013 Note: Size of circle estimates relative impact of incident in terms of cost to business. We are in an era of continuous breaches. SQL injection Spear phishing DDoS Third-party software Physical access Malware XSS Watering hole Undisclosed Attack types
  15. 15. © 2015 IBM Corporation IBM Security 14 IBM Security Systems IT’s Role and Focus has Changed Many different use cases within a single company Corporate Owned BYOD Shared Devices Cart Devices Kiosk Devices Data Leakage Apps Blacklisting URL filtering SharePoint/EFSS Intranet Access
  16. 16. © 2015 IBM Corporation IBM Security 15 IBM Security Systems Mobility Is Strategic Enterprise Mobility Management has become a Foundation in every Mobile Strategy
  17. 17. © 2015 IBM Corporation IBM Security 16 IBM Security Systems IBM MobileFirst Protect Layered Approach Secure the Device Secure the Content Secure the App Secure the Network Separating Corporate and Personal Lives
  18. 18. © 2015 IBM Corporation IBM Security 17 IBM Security Systems Secure the Device Dynamic security and compliance features continuously monitor devices and take action.
  19. 19. © 2015 IBM Corporation IBM Security 18 IBM Security Systems Secure the Container: Mail & Content An office productivity app with email, calendar, contacts, & content
  20. 20. © 2015 IBM Corporation IBM Security 19 IBM Security Systems Secure the App Enhancing private and public app security through (SDK or wrapping) code libraries and policies
  21. 21. © 2015 IBM Corporation IBM Security 20 IBM Security Systems Secure the Network A fully-functional web browser to enable secure access to corporate intranet sites and enforce compliance of policies
  22. 22. © 2015 IBM Corporation IBM Security 21 IBM Security Systems IBM MobileFirst Protect Delivers an Integrated Approach One Platform for All Your Mobile Assets Secure Content Collaboration Secure Mobile Containers Comprehensive Mobile Management Seamless Enterprise Access
  23. 23. © 2015 IBM Corporation IBM Security 22 IBM Security Systems Embrace The New Normal Mobile is becoming THE IT platform Go beyond enabling these new devices – Mobile utilization of corporate network/resources – Separation of corporate & personal apps/data – App management & security (and app dev assist) – Identity, context and more sophisticated policy
  24. 24. © 2015 IBM Corporation IBM Security 23 IBM Security Systems Wrap-up  Unlocking productivity with Apps and Content  Capabilities exists today to Enable  Take a Layered approach for Security You can do it now,  Empower Users  Build Trust  Do it with IBM Mobile First protect David Lingenfelter @simply_security
  25. 25. © 2015 IBM Corporation IBM Security 24 IBM Security Systems www.ibm.com/security © Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

×