ibm future of work forum€¦ · approved cloud apps mobile byod on prem risky apps approved apps...

17
IBM Cognitive IBM Future of Work Forum The Engaged Enterprise Comes Alive Improving Organizational Collaboration and Efficiency While Enhancing Security on Mobile and Cloud Apps Chris Hockings IBM Master Inventor

Upload: others

Post on 08-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

IBM Cognitive

IBM Future of Work Forum

The Engaged Enterprise Comes Alive

Improving Organizational Collaboration and Efficiency While Enhancing Security on Mobile and Cloud Apps

Chris HockingsIBM Master Inventor

Page 2: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

2 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Smartphones bring great opportunity to help drive better IT process

• Utilize the best aspects of the device to drive better engagement

• Good design incorporates new platform elements• Trusted computing modules• GPS and geolocational data• Behavioral elements• Profile/sandbox

Page 3: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

3 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Allowing users to bring their own Apps for their Mobile from Cloud

• Bring your own Apps

• Bring your own Authentication

• Bring your own Data

• Bring your own Network

• Bring your own Social

• Bring your own Expectations!

Page 4: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

4 9/9/2016 © 2016 IBM

IBM Future of Work Forum

COMPLIANCEHUMANERROR

SKILLS GAPADVANCED

ATTACKSINNOVATION

Today’s IBM Security focus areas

We’re focusing today on Innovation

Page 5: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

5 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Yes, Mobiles and Clouds have security problems

The list below represents the OWASP Mobile Top Ten 2016:

Threat No. 1: Weak Server Side Controls

Threat No. 2: Insecure Data Storage

Threat No. 3: Insufficient Transport Layer Protection

#4 Mobile Security Concern: Unintended Data Leakage

#5 Mobile Security Concern: Poor Authorization and AuthenticationThreat No. 6: Broken Cryptography

Threat No. 7: Client Side Injection

Threat No. 8: Security Decisions Via Untrusted Inputs

#9 Mobile Security Concern: Improper Session HandlingThreat No. 10: Lack of Binary Protection

The Cloud Security Alliance (CSA) recently published Cloud Computing’s Top Threats in 2016 report:

Threat No. 1: Data breaches

#2 Cloud Security Concern: Insufficient Identity, Credential and Access ManagementThreat No. 3: Hacked interfaces and APIs

Threat No. 4: Exploited system vulnerabilities

Threat No. 5: Account hijacking

#6 Cloud Security Concern: Malicious InsidersThreat No. 7: The APT parasite

#8 Cloud Security Concern: Permanent data lossThreat No. 9: Inadequate diligence

Threat No. 10: Cloud service abuses

Threat No. 11: DoS attacks

Threat No. 12: Shared technology, shared dangers

Page 6: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

6 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Why IBM and Box – The Security Perspective

Transform work for your industry by delivering the right information

to your people, customers and partners wherever they are

Reduce risk with best in-class security, compliance, and global

availability

Joint development activities to deliver new innovation for content

rich applications

1

2

3

Page 7: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

7 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Which basic security technology domains help the enterprise?

Page 8: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

8 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Web Security Gateways

AppScan

MobileFirst Protect (MaaS360)

QRadar SIEM

QRadar Vulnerability Manager

IBM X-Force Research

QRadar Risk Manager

QRadar Incident Forensics

QRadar Log Manager

zSecure

TrusteerMobile

TrusteerRapport

SiteProtector

Network Protection XGS

Key Lifecycle Manager

Guardium

Identity Manager

Access Manager Identity Governance and Intelligence

Privileged Identity Manager

BigFix

Trusteer Apex

Network

Advanced

Fraud

Data

Mobile

Applications

Endpoint

Identityand

Access

Security Intelligence

TrusteerPinpoint

ConsultingServices

ManagedServices

Mobile

Engagement is a critical aspect of security programs of work

Data

Applications

Page 9: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

9 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Identify your users, secure and retain identity controls

Access Management for user preferred authentication and Single Sign-on capability

On-premise employee or customer authentication scenarios

Identity governance and privileged identity management

Lifecycle management of your employees as they enter and leave the organization

#5 Mobile Security Concern: Poor Authorization and Authentication

#6 Cloud Security Concern: Malicious Insiders

Page 10: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

10 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Keep enterprise mobile content secure

Single console to control and manage all apps, including Box

Enforces policies to ensure data is secure based on a user’s role or device security posture

Pre-integrated with Box APIs

#8 Cloud Security Concern: Permanent data loss

#4 Mobile Security Concern: Unintended Data Leakage

#9 Mobile Security Concern: Improper Session Handling

Page 11: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

11 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Let’s see them in action

Page 12: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

12 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Securely understand and then deploy cloud services

Detect and track approved services while blocking shadow apps

Leverage standard Box protocols for single sign on (SSO) for seamless user experience

App catalog to connect users to approved cloud apps

MOBILE

BYOD

ON PREM

RISKY APPS

APPROVED APPS

EMPLOYEES

Identity and Access Control

Threat Prevention

Policy Enforcement

Discovery and Visibility

Cloud Event Correlation

DETECT PROTECTCONNECT

#2 Cloud Security Concern: Insufficient Identity, Credential and Access Management

#4 Mobile Security Concern: Unintended Data Leakage

Know what your users are doing both on premise and from the cloud

Page 13: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

13 9/9/2016 © 2016 IBM

IBM Future of Work Forum

box and IBM Cloud Security Enforcer in action

• Connect Users with Enterprise Box instance, provide SSO, provide governance

Page 14: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

14 9/9/2016 © 2016 IBM

IBM Future of Work Forum

box and IBM MaaS360 MDM in action

• Open a File on box, authenticate to the Enterprise

Page 15: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

15 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Office365, IBM MaaS360 MDM and box in action

• Select to edit the file using Office365

Page 16: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

16 9/9/2016 © 2016 IBM

IBM Future of Work Forum

Summary

• Employees expect the same engagement at work as in life

• Cloud and Mobile is helping enterprise achieve similar levels of engagement

• Threat actors are focusing efforts to exploit vulnerabilities in cloud and mobile services

• Enterprise collaboration can be enabled by applying identity and mobile security controls

• Standardizing on services such as Box for storage and help concentrate investment and therefore optimize spend

Page 17: IBM Future of Work Forum€¦ · approved cloud apps MOBILE BYOD ON PREM RISKY APPS APPROVED APPS EMPLOYEES Identity and Access Control Threat Prevention Policy Enforcement Discovery

17 9/9/2016 © 2016 IBM

IBM Future of Work Forum

THANK YOU.