SlideShare a Scribd company logo
0© 2015 IBM Corporation
Enabling Secure
Use of Cloud
Applications
Dan Wolff,
Program Director, Cloud Security Product
Management
1© 2015 IBM Corporation
Recent Security Timeline
1
614 reported breaches
91,982,172 records
2013
Host
Intrusion
Prevention
Endpoint
Sandboxing
Application
Whitelisting
Web
Filtering
Cloud-based
malware
detection
Network
Sandboxing
Next Gen
FW
Network
Intrusion
Prevention
Secure Web
Gateways
Web App FW
2© 2015 IBM Corporation
Expansion of Cloud Services
2
External StakeholdersTraditional Enterprise IT
Public CloudPrivate Cloud
PaaS
Development
services
SaaS
Business
applications
IaaS
Infrastructure
services
100+ IBM
Offerings
HR,
CRM, SCM
Data
archive
App
development
100+ IBM
Offerings
Online
website
3© 2015 IBM Corporation
Additional Cloud Threats and Vulnerabilities
 Placement (co-tenancy);
exposure to data breach / loss
 Configuration errors
 Malicious insider
 Software
vulnerabilities
Cloud is now integral part of many data breaches
4© 2015 IBM Corporation
The “Secure” Cloud?
4
But isn’t the cloud already secure?
Even the experts can’t agree
Google
Microsoft
Information Week
HIPAA
5© 2015 IBM Corporation
What you can expect from your provider
5
Vulnerabilities in the
platform
Intrusion monitoring
Widespread data theftDenial of service
Cloud Vendor
is Responsible
Network & Application
6© 2015 IBM Corporation
What are you responsible for?
6
You are Responsible
Compliance Threat Prevention &
Visibility
Identity management
Credential theft
Insider misuse of data/
data sharing
7© 2015 IBM Corporation
Customer Imperatives for Improving Security
Detect threats with
visibility across clouds
Govern the
usage of cloud
Protect workloads
and data in the cloud
How can I understand who
is accessing the cloud
from anywhere, at anytime?
How can I fix vulnerabilities
and defend against attacks
before they’re exploited?
How can I obtain a
comprehensive view of cloud
and traditional environments?
8© 2015 IBM Corporation
Cloud is an opportunity to radically
transform security practices
Cloud-enhanced Security
Designed for elastic cloud
environments
Traditional Security
Designed for static devices
behind traditional network
protection
9© 2015 IBM Corporation
Companies are Adopting Cloud Applications
EMPLOYEES IT OPERATIONS CISO
Using Cloud for:
• Cloud Storage
• Collaboration
• Much more
Using Cloud to:
 Save money
 Reduce complexity
 Automate
 Consolidate
 Loses visibility/control
 Risk of data loss
 Web based threats
10© 2015 IBM Corporation
Cloud Applications Mobile Employees
How Can You Protect What You Can’t See?
CASBs are an important
visibility tool for CISOs
CASBs collect cloud app usage
details on traffic going through
corporate gateways
Mobile users can go directly to
cloud apps – creating the “mobile
blind spot”
 Cellular networks
• Both in and out of the office
 Home WiFi or mobile hot spots
 Adds risk of malware, risky behavior,
and corporate policy violations
On-Premise and Remote / VPN Employees
Web gateway,
Firewall, IPS, etc.
CASBs
But “Blind spots” still exist
for mobile usage
11© 2015 IBM Corporation
Security and IT leaders face new challenges
“My team can’t manage
increased employee
usage of cloud”
 Gain visibility of all cloud app usage
 Simplify connecting to approved apps
 Remove mobile blind spots
 Stop risky user behavior
 Quickly detect and react to threats
 Ensure compliance/governance
How does my organization?
12© 2015 IBM Corporation
IT Leaders are telling us they want to…
“We need to streamline the number of cloud
security technologies. My IT analysts need to
be more efficient and cut down on errors.”
State Government
Agency
“I have to simplify employee adoption of
approved cloud apps. It’s critical for us to
integrate identities with cloud discovery and
usage.”
Major
Retailer
“One of our biggest problems is visibility into
mobile device activity. We can’t enforce policy
if we can’t see the traffic.”
Major Financial
Services Organization
13© 2015 IBM Corporation
MOBILE
BYOD
ON PREM
RISKY
APPS
APPROVED APPS
A new SaaS solution to help
securely deploy cloud services
EMPLOYEES
Identity and
Access Control
Threat
Prevention
Policy
Enforcement
Discovery
and Visibility
Cloud Event
Correlation
© 2015 IBM Corporation© 2015 IBM Corporation
Managing Cloud Usage
IT Admin view
15© 2015 IBM Corporation
16© 2015 IBM Corporation
 Respond to new threats,
in or out of the office
 Integrated with threat
intelligence from
IBM X-Force
RESPONSE TO THREATS
17© 2015 IBM Corporation
 Block risky or
unsanctioned apps
on mobile devices
 Coach safe employee
usage
PROTECT BY
LIMITING ACCESS
18© 2015 IBM Corporation
Unified Cloud Security Platform
Identity and
Access Control
Threat
Prevention
Policy
Enforcement
Discovery
and Visibility
Cloud Event
Correlation
• X-Force Risk scoring
for 1000’s of apps
• 360 degree,
continuous stream
of cloud activity data
• Mobile integration to
uncover blind spots
• Federated cloud SSO
• Simplified quick
connectors to
popular cloud apps
• No programming
required
• Self-service catalogs
• Delegated
administration
• User activity and
traffic monitoring
• Behavioral analysis
and correlation to
company policies
• Alerting, reporting,
and auditing
• In-line Intrusion
Prevention for all
mobile traffic
• Threat signatures,
network analysis,
and zero-day
threat protection
• User coaching
• Redirection for
out-of-policy usage
• Policy and anomaly
rule implementation
19© 2015 IBM Corporation
Key takeaways
Cloud is an opportunity to do security right
Cloud is an opportunity to increase IT efficiency
Cloud is an opportunity to protect against threats
Combine Visibility, Data Protection, Threat Prevention and
Access Management
1
2
3
4
Thank You

More Related Content

What's hot

2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
Skyhigh Networks
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
Skyhigh Networks
 
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
Skyhigh Networks
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
CloudLock
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
Doug Copley
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Symantec
 
Company presentation
Company presentationCompany presentation
Company presentation
arunkuri
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
Skyhigh Networks
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
Robert Crane
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
Akamai Technologies
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
Ericom Software
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
Anshita Dixit
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security
 
The Dark Side of the Web
The Dark Side of the WebThe Dark Side of the Web
The Dark Side of the Web
Skyhigh Networks
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
Bitglass
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
Killian Delaney
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
Netskope
 

What's hot (20)

2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
The Cloud Economy: 11 Essential Trends About How Companies Connect to Each Ot...
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Company presentation
Company presentationCompany presentation
Company presentation
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Competitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven DifferentiationCompetitive EDGE - Data Driven Differentiation
Competitive EDGE - Data Driven Differentiation
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
The Dark Side of the Web
The Dark Side of the WebThe Dark Side of the Web
The Dark Side of the Web
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
IBM MaaS360 with Watson
IBM MaaS360 with WatsonIBM MaaS360 with Watson
IBM MaaS360 with Watson
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 

Similar to Enabling Secure Use of Cloud Applications

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
Francisco González Jiménez
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
IBM Security
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
Tyrone Systems
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
AGILLY
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
gule mariam
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
IBM Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
Abhishek Sood
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
AGILLY
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
Cloud - DC Poland Open Days
Cloud - DC Poland Open DaysCloud - DC Poland Open Days
Cloud - DC Poland Open Days
Andrzej Osmak
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
MarketingArrowECS_CZ
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 

Similar to Enabling Secure Use of Cloud Applications (20)

IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM8 Principales Raisons de Passer du MDM à l'EMM
8 Principales Raisons de Passer du MDM à l'EMM
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Cloud - DC Poland Open Days
Cloud - DC Poland Open DaysCloud - DC Poland Open Days
Cloud - DC Poland Open Days
 
Becoming an interconnected enterprise
Becoming an interconnected enterpriseBecoming an interconnected enterprise
Becoming an interconnected enterprise
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Zabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředíZabezpečení mobilních zařízení ve firemním prostředí
Zabezpečení mobilních zařízení ve firemním prostředí
 
Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 

More from Sonia Baratas Alves

How will IoT change the world as we know it?
How will IoT change the world as we know it?How will IoT change the world as we know it?
How will IoT change the world as we know it?
Sonia Baratas Alves
 
Why attend IBM Amplify 2016
Why attend IBM Amplify 2016Why attend IBM Amplify 2016
Why attend IBM Amplify 2016
Sonia Baratas Alves
 
Cognitive Business
Cognitive BusinessCognitive Business
Cognitive Business
Sonia Baratas Alves
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
Sonia Baratas Alves
 
IBM Bluemix Openwhisk
IBM Bluemix OpenwhiskIBM Bluemix Openwhisk
IBM Bluemix Openwhisk
Sonia Baratas Alves
 
IBM Cloud - Open by Design
IBM Cloud - Open by DesignIBM Cloud - Open by Design
IBM Cloud - Open by Design
Sonia Baratas Alves
 
What Watson can do for you
What Watson can do for youWhat Watson can do for you
What Watson can do for you
Sonia Baratas Alves
 
What's coming in 2016? Cognitive Analytics
What's coming in 2016? Cognitive AnalyticsWhat's coming in 2016? Cognitive Analytics
What's coming in 2016? Cognitive Analytics
Sonia Baratas Alves
 
Introducing Journey Analytics
Introducing Journey AnalyticsIntroducing Journey Analytics
Introducing Journey Analytics
Sonia Baratas Alves
 
IBM Smarter Storage for Smarter Computing
IBM Smarter Storage for Smarter ComputingIBM Smarter Storage for Smarter Computing
IBM Smarter Storage for Smarter Computing
Sonia Baratas Alves
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
Sonia Baratas Alves
 
Ibm watson
Ibm watsonIbm watson
Making the most of our data
Making the most of our dataMaking the most of our data
Making the most of our data
Sonia Baratas Alves
 
Storwize 7000 Nueva era de almacenamiento
Storwize 7000 Nueva era de almacenamientoStorwize 7000 Nueva era de almacenamiento
Storwize 7000 Nueva era de almacenamiento
Sonia Baratas Alves
 

More from Sonia Baratas Alves (14)

How will IoT change the world as we know it?
How will IoT change the world as we know it?How will IoT change the world as we know it?
How will IoT change the world as we know it?
 
Why attend IBM Amplify 2016
Why attend IBM Amplify 2016Why attend IBM Amplify 2016
Why attend IBM Amplify 2016
 
Cognitive Business
Cognitive BusinessCognitive Business
Cognitive Business
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
IBM Bluemix Openwhisk
IBM Bluemix OpenwhiskIBM Bluemix Openwhisk
IBM Bluemix Openwhisk
 
IBM Cloud - Open by Design
IBM Cloud - Open by DesignIBM Cloud - Open by Design
IBM Cloud - Open by Design
 
What Watson can do for you
What Watson can do for youWhat Watson can do for you
What Watson can do for you
 
What's coming in 2016? Cognitive Analytics
What's coming in 2016? Cognitive AnalyticsWhat's coming in 2016? Cognitive Analytics
What's coming in 2016? Cognitive Analytics
 
Introducing Journey Analytics
Introducing Journey AnalyticsIntroducing Journey Analytics
Introducing Journey Analytics
 
IBM Smarter Storage for Smarter Computing
IBM Smarter Storage for Smarter ComputingIBM Smarter Storage for Smarter Computing
IBM Smarter Storage for Smarter Computing
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Ibm watson
Ibm watsonIbm watson
Ibm watson
 
Making the most of our data
Making the most of our dataMaking the most of our data
Making the most of our data
 
Storwize 7000 Nueva era de almacenamiento
Storwize 7000 Nueva era de almacenamientoStorwize 7000 Nueva era de almacenamiento
Storwize 7000 Nueva era de almacenamiento
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Enabling Secure Use of Cloud Applications

  • 1. 0© 2015 IBM Corporation Enabling Secure Use of Cloud Applications Dan Wolff, Program Director, Cloud Security Product Management
  • 2. 1© 2015 IBM Corporation Recent Security Timeline 1 614 reported breaches 91,982,172 records 2013 Host Intrusion Prevention Endpoint Sandboxing Application Whitelisting Web Filtering Cloud-based malware detection Network Sandboxing Next Gen FW Network Intrusion Prevention Secure Web Gateways Web App FW
  • 3. 2© 2015 IBM Corporation Expansion of Cloud Services 2 External StakeholdersTraditional Enterprise IT Public CloudPrivate Cloud PaaS Development services SaaS Business applications IaaS Infrastructure services 100+ IBM Offerings HR, CRM, SCM Data archive App development 100+ IBM Offerings Online website
  • 4. 3© 2015 IBM Corporation Additional Cloud Threats and Vulnerabilities  Placement (co-tenancy); exposure to data breach / loss  Configuration errors  Malicious insider  Software vulnerabilities Cloud is now integral part of many data breaches
  • 5. 4© 2015 IBM Corporation The “Secure” Cloud? 4 But isn’t the cloud already secure? Even the experts can’t agree Google Microsoft Information Week HIPAA
  • 6. 5© 2015 IBM Corporation What you can expect from your provider 5 Vulnerabilities in the platform Intrusion monitoring Widespread data theftDenial of service Cloud Vendor is Responsible Network & Application
  • 7. 6© 2015 IBM Corporation What are you responsible for? 6 You are Responsible Compliance Threat Prevention & Visibility Identity management Credential theft Insider misuse of data/ data sharing
  • 8. 7© 2015 IBM Corporation Customer Imperatives for Improving Security Detect threats with visibility across clouds Govern the usage of cloud Protect workloads and data in the cloud How can I understand who is accessing the cloud from anywhere, at anytime? How can I fix vulnerabilities and defend against attacks before they’re exploited? How can I obtain a comprehensive view of cloud and traditional environments?
  • 9. 8© 2015 IBM Corporation Cloud is an opportunity to radically transform security practices Cloud-enhanced Security Designed for elastic cloud environments Traditional Security Designed for static devices behind traditional network protection
  • 10. 9© 2015 IBM Corporation Companies are Adopting Cloud Applications EMPLOYEES IT OPERATIONS CISO Using Cloud for: • Cloud Storage • Collaboration • Much more Using Cloud to:  Save money  Reduce complexity  Automate  Consolidate  Loses visibility/control  Risk of data loss  Web based threats
  • 11. 10© 2015 IBM Corporation Cloud Applications Mobile Employees How Can You Protect What You Can’t See? CASBs are an important visibility tool for CISOs CASBs collect cloud app usage details on traffic going through corporate gateways Mobile users can go directly to cloud apps – creating the “mobile blind spot”  Cellular networks • Both in and out of the office  Home WiFi or mobile hot spots  Adds risk of malware, risky behavior, and corporate policy violations On-Premise and Remote / VPN Employees Web gateway, Firewall, IPS, etc. CASBs But “Blind spots” still exist for mobile usage
  • 12. 11© 2015 IBM Corporation Security and IT leaders face new challenges “My team can’t manage increased employee usage of cloud”  Gain visibility of all cloud app usage  Simplify connecting to approved apps  Remove mobile blind spots  Stop risky user behavior  Quickly detect and react to threats  Ensure compliance/governance How does my organization?
  • 13. 12© 2015 IBM Corporation IT Leaders are telling us they want to… “We need to streamline the number of cloud security technologies. My IT analysts need to be more efficient and cut down on errors.” State Government Agency “I have to simplify employee adoption of approved cloud apps. It’s critical for us to integrate identities with cloud discovery and usage.” Major Retailer “One of our biggest problems is visibility into mobile device activity. We can’t enforce policy if we can’t see the traffic.” Major Financial Services Organization
  • 14. 13© 2015 IBM Corporation MOBILE BYOD ON PREM RISKY APPS APPROVED APPS A new SaaS solution to help securely deploy cloud services EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery and Visibility Cloud Event Correlation
  • 15. © 2015 IBM Corporation© 2015 IBM Corporation Managing Cloud Usage IT Admin view
  • 16. 15© 2015 IBM Corporation
  • 17. 16© 2015 IBM Corporation  Respond to new threats, in or out of the office  Integrated with threat intelligence from IBM X-Force RESPONSE TO THREATS
  • 18. 17© 2015 IBM Corporation  Block risky or unsanctioned apps on mobile devices  Coach safe employee usage PROTECT BY LIMITING ACCESS
  • 19. 18© 2015 IBM Corporation Unified Cloud Security Platform Identity and Access Control Threat Prevention Policy Enforcement Discovery and Visibility Cloud Event Correlation • X-Force Risk scoring for 1000’s of apps • 360 degree, continuous stream of cloud activity data • Mobile integration to uncover blind spots • Federated cloud SSO • Simplified quick connectors to popular cloud apps • No programming required • Self-service catalogs • Delegated administration • User activity and traffic monitoring • Behavioral analysis and correlation to company policies • Alerting, reporting, and auditing • In-line Intrusion Prevention for all mobile traffic • Threat signatures, network analysis, and zero-day threat protection • User coaching • Redirection for out-of-policy usage • Policy and anomaly rule implementation
  • 20. 19© 2015 IBM Corporation Key takeaways Cloud is an opportunity to do security right Cloud is an opportunity to increase IT efficiency Cloud is an opportunity to protect against threats Combine Visibility, Data Protection, Threat Prevention and Access Management 1 2 3 4