SlideShare a Scribd company logo
1 of 22
Download to read offline
Knock, Knock…The Internet of Things
wants to come in?
Ralph Huenten
Security
CA Technologies
Security Presales - EMEA
SCT31T
@casecurity
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
The Internet of Things (IoT) will connect users to
the enterprise or just connect to the enterprise
independently — but what will be used to
secure this access? Come see how CA Security
can secure access to and from the IoT.
Ralph
Huenten
CA Technologies
Advisor
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Digital transformation is underway
Half of enterprises today say the application economy is significantly disrupting their
industry—while 44% say it is doing the same to their own organization 1
-- CA Technologies with Vanson Bourne
1.75B
smartphone users in
2014 1
25
Business apps per
device2
50B
Connected devices
(IoT) by 2020 3
>$100B
in cloud spending
this year 4
Sources:
1. CA Vanson Bourne Study
2. eMarketer study
3. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013
4. GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
This drives the need for increased Security
Security concerns - the top
obstacle in app economy#1
$12.7M
Average cost to the
company for a breach
Overall IT spend
devoted to Security
over next 3 years
>25%
2
78%
Increase in # of breached
records from 2013 to 20143
16,856
Number of attacks the
average company had
in 2013
1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 2014
2. The 2014 Cost of Cyber Crime Study Reveals Increased Risks, Oct, 2014
3. http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
IoT Represents the Next Wave of Risk
The Internet of Things (IoT) will connect users to the enterprise or just connect to the
enterprise independently — but what will be used to secure this access?
• How will users authenticate to
the IoT devices?
• How will IoT devices
authenticate to the enterprise?
50B
Connected devices
(IoT) by 2020 3
IoT Devices The EnterpriseUsers
• What types of data can the IoT
devices access?
• What types of transactions can
the IoT devices perform?
What happens to the IoT device if it is hacked?
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Solution
 Components:
– CA API Gateway
 used to secure communications between users and IoT devices and
between IoT devices and the enterprise.
– CA Advanced Authentication
 used to authenticate users to IoT devices and IoT devices to the enterprise.
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Solution Conceptual Architecture
CA API Gateway
CA Advanced
Authentication
IoT Devices The EnterpriseUsers
Secures Communications
Between users, IoT, and Enterprise
Provides MFA and
risk analysis for
authentication
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
CA Security Innovation Demo
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Users Enroll using
Demo iPad/laptop or
their own device
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Demo supports direct enrollment
or social media registration
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
During direct enrollment, user is prompted to
enter First Name, Last Name, ID and password.
This data is used to create an account in CA
Advanced Authentication.
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Users can then click to
Start Test Drive
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
User is prompted to login using User ID
/ Password, which is then validated by
CA Advanced Authentication.
The demo can support
• Basic with/without risk authentication
• CA Auth ID with/without risk authentication
• CA Mobile OTP with/without risk authentication
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
Once authenticated, the gateway will release the
request to start slot car engine to CloudMQTT,
which will determine which slot car is currently
available and place the request in that queue.
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race Track
Raspberry periodically checks with CloudMQTT
for new requests, and will turn on power to the
correct car when a new request is retrieved.
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Security Innovation Demo
CA World User Multiple
Devices
CA API
Gateway
CA Advanced
Authentication
Social Media CloudMQTT Raspberry Pi
Slot Car Race TrackAt end of Test Drive, users can
select to Stop Engine, which
will also disable their account
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Summary
 Authentication
– User access to IoT devices can be protected by CA Adv. Authentication
using MFA credentials and/or Risk-Based Authentication
 Orchestration
– Communications between users, web/mobile apps, IoT devices, and CA
Adv. Auth servers can be orchestrated by CA API Gateway
– The gateway also provides protocol translation where necessary
CA SECURITY FOR THE INTERNET OF THINGS
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCT05S Roadmap: CA Advanced Authentication and CA SSO Wed. Nov 18 at 4:30 pm
SCT24T
Mobile Risk Analysis: Take Your Mobile App Security to
the Next Level
Thurs. Nov 19 at 1:00 pm
SCT21T Enable Omnichannel with Security and API Management Thurs. Nov 19 at 2:00 pm
SCT17T Strong Auth in IdM Thurs. Nov 19 at 3:45 pm
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Protect Against
Fraud & Breaches
CA Advanced Auth
Security Theater
Engage
Customers
CA SSO
Security Theater
Innovation – IoT
Slot Car
CA AA, APIM
Security Theater
Secure Omni-
Channel Access
CA AA, APIM, SSO
Security Theater
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services OrchestratorCA Technologies
 
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...CA Technologies
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...CA Technologies
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box CA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Continuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsContinuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsCA Technologies
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMCA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 
A Week in the Life (of DevOps)
A Week in the Life (of DevOps)A Week in the Life (of DevOps)
A Week in the Life (of DevOps)CA Technologies
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...CA Technologies
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionCA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentCA Technologies
 

What's hot (20)

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...American Family Insurance Shifts to a Mobile-First Development Strategy with ...
American Family Insurance Shifts to a Mobile-First Development Strategy with ...
 
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
Tech Talk: Master Your Continuous Delivery Pipeline with a New Level of Orche...
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
See Inside the Middleware Black Box
See Inside the Middleware Black Box See Inside the Middleware Black Box
See Inside the Middleware Black Box
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Continuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOpsContinuous Integration and Orchestration: Putting the AppDev in DevOps
Continuous Integration and Orchestration: Putting the AppDev in DevOps
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSM
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
A Week in the Life (of DevOps)
A Week in the Life (of DevOps)A Week in the Life (of DevOps)
A Week in the Life (of DevOps)
 
It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?It's the 2010's. Why are you Still Manually Writing Tests?
It's the 2010's. Why are you Still Manually Writing Tests?
 
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
Technology Primer: Monitor Node.js App Performance and the Impact to DevOps w...
 
Getting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication SolutionGetting the Most from Your CA Advanced Authentication Solution
Getting the Most from Your CA Advanced Authentication Solution
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
Raising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App DevelopmentRaising the Speed Limit on Mobile App Development
Raising the Speed Limit on Mobile App Development
 

Viewers also liked

Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupScaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupCA Technologies
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueCA Technologies
 
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...intasave-caribsavegroup
 
Revelation 12
Revelation 12Revelation 12
Revelation 12pegbaker
 
Mandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansMandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansNAP Events
 
Animal Project: Dr. Terdal
Animal Project: Dr. TerdalAnimal Project: Dr. Terdal
Animal Project: Dr. TerdalAnam Ashraf
 
Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences NAP Events
 
BiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyBiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyJonathan Eisen
 
Journalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefJournalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefGary Schroeder
 
Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Jessica Laccetti
 
Digital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planDigital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planiktplan
 
Opphavsrett multippel choice
Opphavsrett multippel choiceOpphavsrett multippel choice
Opphavsrett multippel choiceiktplan
 
Turismo natureza
Turismo natureza  Turismo natureza
Turismo natureza kyzinha
 
Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Wilmer68
 
The History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousThe History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousSentient Decision Science
 

Viewers also liked (19)

Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth GroupScaling Scaled Agile: Lessons Learned at UnitedHealth Group
Scaling Scaled Agile: Lessons Learned at UnitedHealth Group
 
Agile Capitalization For Greater Business Value
Agile Capitalization For Greater Business ValueAgile Capitalization For Greater Business Value
Agile Capitalization For Greater Business Value
 
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
Climate Change Scenarios for Tourist Destinations in Jamaica: Montego Bay and...
 
Revelation 12
Revelation 12Revelation 12
Revelation 12
 
Ciencia
CienciaCiencia
Ciencia
 
Mandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation PlansMandate for the process to formulate and implement National Adaptation Plans
Mandate for the process to formulate and implement National Adaptation Plans
 
Animal Project: Dr. Terdal
Animal Project: Dr. TerdalAnimal Project: Dr. Terdal
Animal Project: Dr. Terdal
 
Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences Regional approaches to adaptation planning : Senegal experiences
Regional approaches to adaptation planning : Senegal experiences
 
Trastornos psicológicos-psquiatricos
Trastornos psicológicos-psquiatricosTrastornos psicológicos-psquiatricos
Trastornos psicológicos-psquiatricos
 
BiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring NoveltyBiS2C: Lecture 12: Acquiring Novelty
BiS2C: Lecture 12: Acquiring Novelty
 
Journalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis BriefJournalism Grad School Websites: A Competitive Analysis Brief
Journalism Grad School Websites: A Competitive Analysis Brief
 
Victorian Climate Change Adaptation Plan
Victorian Climate Change Adaptation PlanVictorian Climate Change Adaptation Plan
Victorian Climate Change Adaptation Plan
 
Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012Lecture 4 - Science Journalism - 2012
Lecture 4 - Science Journalism - 2012
 
Digital dømmekraft - IKT-plan
Digital dømmekraft - IKT-planDigital dømmekraft - IKT-plan
Digital dømmekraft - IKT-plan
 
Opphavsrett multippel choice
Opphavsrett multippel choiceOpphavsrett multippel choice
Opphavsrett multippel choice
 
Turismo natureza
Turismo natureza  Turismo natureza
Turismo natureza
 
Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación Los test y sus clasificaciones presentación
Los test y sus clasificaciones presentación
 
The History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-ConsciousThe History and Future of Connecting with the Consumer Non-Conscious
The History and Future of Connecting with the Consumer Non-Conscious
 
Independent and Outside Directors
Independent and Outside DirectorsIndependent and Outside Directors
Independent and Outside Directors
 

Similar to Knock, Knock…The Internet of Things wants to come in?

Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCA Technologies
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...CA Technologies
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeWebinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...CA Technologies
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementCA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...CA Technologies
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementCA Technologies
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersCA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...CA Technologies
 

Similar to Knock, Knock…The Internet of Things wants to come in? (20)

Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OS
 
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
Case Study: Intel Corporation - The Benefits of, and Need for Agile Operation...
 
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy ChallengeWebinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API Management
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Knock, Knock…The Internet of Things wants to come in?

  • 1. Knock, Knock…The Internet of Things wants to come in? Ralph Huenten Security CA Technologies Security Presales - EMEA SCT31T @casecurity #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? Come see how CA Security can secure access to and from the IoT. Ralph Huenten CA Technologies Advisor
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Digital transformation is underway Half of enterprises today say the application economy is significantly disrupting their industry—while 44% say it is doing the same to their own organization 1 -- CA Technologies with Vanson Bourne 1.75B smartphone users in 2014 1 25 Business apps per device2 50B Connected devices (IoT) by 2020 3 >$100B in cloud spending this year 4 Sources: 1. CA Vanson Bourne Study 2. eMarketer study 3. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013 4. GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD This drives the need for increased Security Security concerns - the top obstacle in app economy#1 $12.7M Average cost to the company for a breach Overall IT spend devoted to Security over next 3 years >25% 2 78% Increase in # of breached records from 2013 to 20143 16,856 Number of attacks the average company had in 2013 1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 2014 2. The 2014 Cost of Cyber Crime Study Reveals Increased Risks, Oct, 2014 3. http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD IoT Represents the Next Wave of Risk The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? • How will users authenticate to the IoT devices? • How will IoT devices authenticate to the enterprise? 50B Connected devices (IoT) by 2020 3 IoT Devices The EnterpriseUsers • What types of data can the IoT devices access? • What types of transactions can the IoT devices perform? What happens to the IoT device if it is hacked?
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Solution  Components: – CA API Gateway  used to secure communications between users and IoT devices and between IoT devices and the enterprise. – CA Advanced Authentication  used to authenticate users to IoT devices and IoT devices to the enterprise.
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Solution Conceptual Architecture CA API Gateway CA Advanced Authentication IoT Devices The EnterpriseUsers Secures Communications Between users, IoT, and Enterprise Provides MFA and risk analysis for authentication
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track CA Security Innovation Demo
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Users Enroll using Demo iPad/laptop or their own device CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Demo supports direct enrollment or social media registration CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo During direct enrollment, user is prompted to enter First Name, Last Name, ID and password. This data is used to create an account in CA Advanced Authentication. CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Users can then click to Start Test Drive CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo User is prompted to login using User ID / Password, which is then validated by CA Advanced Authentication. The demo can support • Basic with/without risk authentication • CA Auth ID with/without risk authentication • CA Mobile OTP with/without risk authentication CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo Once authenticated, the gateway will release the request to start slot car engine to CloudMQTT, which will determine which slot car is currently available and place the request in that queue. CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race Track Raspberry periodically checks with CloudMQTT for new requests, and will turn on power to the correct car when a new request is retrieved.
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Security Innovation Demo CA World User Multiple Devices CA API Gateway CA Advanced Authentication Social Media CloudMQTT Raspberry Pi Slot Car Race TrackAt end of Test Drive, users can select to Stop Engine, which will also disable their account
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Summary  Authentication – User access to IoT devices can be protected by CA Adv. Authentication using MFA credentials and/or Risk-Based Authentication  Orchestration – Communications between users, web/mobile apps, IoT devices, and CA Adv. Auth servers can be orchestrated by CA API Gateway – The gateway also provides protocol translation where necessary CA SECURITY FOR THE INTERNET OF THINGS
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCT05S Roadmap: CA Advanced Authentication and CA SSO Wed. Nov 18 at 4:30 pm SCT24T Mobile Risk Analysis: Take Your Mobile App Security to the Next Level Thurs. Nov 19 at 1:00 pm SCT21T Enable Omnichannel with Security and API Management Thurs. Nov 19 at 2:00 pm SCT17T Strong Auth in IdM Thurs. Nov 19 at 3:45 pm
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Protect Against Fraud & Breaches CA Advanced Auth Security Theater Engage Customers CA SSO Security Theater Innovation – IoT Slot Car CA AA, APIM Security Theater Secure Omni- Channel Access CA AA, APIM, SSO Security Theater
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15