Welcometo’ Track4Techs’ · 2015-08-08 · ©+2015+IBMCorporaon+ 8 New apps are consolidating...
Transcript of Welcometo’ Track4Techs’ · 2015-08-08 · ©+2015+IBMCorporaon+ 8 New apps are consolidating...
Welcome to Track4Techs #ChannelCon15
© 2015 IBM Corpora4on 2
BUILDING DIGITAL ORGANIZATIONS
www.comp?a.org
© 2015 IBM Corpora4on 3
Entering a New Era of Enterprise Technology
Mainframe Technology not widely accessible
Technology use highly restricted
Technology management highly centralized
PC/ Internet
Technology moderately accessible
Technology use becoming pervasive
Technology management mostly centralized
Cloud/ Mobile
Technology widely accessible
Technology use very open
Technology management decentralized
Source: CompTIA
Refrigerators Telling Secrets: How the Internet of Things Will Change Privacy
© 2015 IBM Corpora4on 5
Descrip?on
Everyone is trying to figure out the Internet of Things (IoT) and where there is business value, but there are a few hurdles in the way before IoT can hit the mass market. One of these hurdles is privacy, as a web of interconnected devices can share informa4on and end users quickly get overwhelmed trying to understand how to manage their data. This session will give an overview of the IoT ecosystem and describe some of the ways that privacy can be handled in this new landscape.
© 2015 IBM Corpora4on 6
IoT is revolutionizing the market and a tremendous growth opportunity
400% Google search traffic on “Internet of things” quadrupled in 20141
75% of companies are exploring or using IoT in the business in some respects (internally/externally)2
62% of C-suite executives believe that companies slow to integrate IoT will fall behind the competition2
IoT will change how an Enterprise operates
1
2
3
Unlock new revenue from existing products/service
Inspire new working practices or processes
Change or create new business model or strategy
36% growth in processing, sensing and communications semiconductor devices
© 2015 IBM Corpora4on 7
Enhancing Operations
Improving Engagement
Leaders embracing IoT are gaining new value
Transforming Business
Accelerating Innovation
Improve product development Optimize asset productivity Increase operational efficiency
Deliver new business models Gain real-time responsiveness Explore new revenue opportunities
© 2015 IBM Corpora4on 8
New apps are consolidating data and capabilities to engage new audiences
Insight from nontraditional sources of data are being
infused in business processes to create new business
moments
New innovations are composed leveraging digital
services from a broad ecosystem
New channels and business models Digital Innovation
Real time insight driven processes
Disruptors are utilizing the Internet of Things and recomposing their businesses by digital transformation
© 2015 IBM Corpora4on 9
Hybrid Cloud Private Cloud Off-premises cloud
IaaS
SaaS
OAuth
PaaS
Open source and communities are key to technology innovation and interoperability
© 2015 IBM Corpora4on 10
IBM – The Only Provider of Enterprise IOT
Only IBM delivers Enterprise IOT by enabling businesses to transform
their Industry with new services, offerings and sources of Revenue.
Accomplished by enabling upstream
innovators who engineer the next generation of connected devices and
those downstream who operate those devices to deliver new new business
outcomes through better innovation,
operation, and customer engagement
IoT
© 2015 IBM Corpora4on 11
IoT value is realized in four founda4onal areas
Industry Transforma4on
Applica4ons & Solu4ons
PlaXorms
Devices & Networks
Evolving new business models
Optimizing operations and enhancing performance
Building and managing IoT solutions
Connecting what matters
© 2015 IBM Corpora4on 12
IBM IoT Security
l Supports and pervades the four foundations of IoT l Industry-specific transformations l Applications and solutions l Platforms l Devices and Networks
l Provide capabilities to assist in the creation, deployment, management, and retirement of devices … and the applications/solutions that use them
l Secure by design
l Secure by deployment
l Secure by usage
© 2015 IBM Corpora4on 13
Understanding and providing security for Internet of Things
Design and Manufacturing Securely l Secure Engineering l Design for Privacy l Test for Security l Continuous Delivery l Ensure Integrity
Operating Securely l Hardened Device l Secured Communication l Monitored Usage l Updated Environment l Trusted Ecosystem
Identifying and understanding threats in your IoT ecosystem allows for better
protection and prevention
© 2015 IBM Corpora4on 14
Security in Internet of Things – Design and Deployment l Design for Security
l threat modeling, mitigations l fail-safe operating modes l identification and authentication l authorization checks l audit records l command verification l communications and data security
l Design for Privacy l data tagging, redaction, filtering, transforming l data combination rules
l Test for Security l source code, runtime environment l while running l denial of service
l Continuous Delivery Model l self-verification l secure Over The Air update
l Ensure Integrity in Manufacturing and Delivery l supply chain security
© 2015 IBM Corpora4on 15
Security in Internet of Things – Deployment and Usage l Harden the Device
l self-verification l Cryptographic capability l device identity and device lifecycle l tamper detection
l Secure Communication Channels l communications security l data security
l Audit and Analyze Usage Patterns l anomaly detection l rogue device identification l rogue application identification
l Maintain up-to-date Security Environment l penetration testing l attack resistance and attack response planning
l Create a Trusted Maintenance Ecosystem l verifiable builds, code signing, code updates l key management l ownership changes l device wipe/reset l locate device
© 2015 IBM Corpora4on 16
Addressing privacy with vast amounts of data generated by Internet of Things
• Hardened Devices with ability to isolate
• Ensure only the right informa4on is broadcast
• Monitored usage and analyze pa_erns for detec4on of issues
• Rich access controls used to prevent unauthorized access
• Secured Communica4on Channels
• Ac4vely dele4ng informa4on as it becomes legal to do so
© 2015 IBM Corpora4on 17
So what are the implica4ons for privacy?
• Companies are realizing that there is value in the information they have collected • But must adhere to the privacy policies put in place • Greater attention to data redaction, filtering, and transformation tools
• Companies that did not have to consider privacy issues before suddenly dealing with this • Warranty and customer service • Diagnostic and preventative maintenance
• New business models will rely on such information • API access to anonymized or group-level information • Immediate processing of information as it is received • At present, users don't control/own their data – service providers do
© 2015 IBM Corpora4on 18
Where are we headed?
• Technology is out-pacing regulations • Home automation • Assistive driving • Wearables
• More information being collected than ever before • Location • Activity • Proximity to others
• Expect to see more privacy policies to agree to • Your next appliance purchase • Your next hotel room stay • Your next vehicle purchase
l Look for (more) opt-in/opt-out selections l Possibly hidden behind new “features”
© 2015 IBM Corpora4on 19
Summary
• Refrigerators won't tell your secrets • But there is a lot of information collected – and growing
• Convenience comes with considerations • Look for the reasons why something is inexpensive
• More data doesn't mean it's 1984 • Companies must state and comply with privacy policies • Information is spread across many places
l Be a wary consumer l Use the features provided l Know the data being collected
l Be a savvy company l Carefully handle, process, and provide access to the information l Use the information wisely
© 2015 IBM Corpora4on 20
l IBM IoT Founda?on ─ h_ps://internetochings.ibmcloud.com/
l IBM Bluemix ─ h_ps://www.bluemix.net/
l IBM SoKLayer ─ h_p://www.soclayer.com/
l IBM Cloud Technologies ─ h_p://www.ibm.com/cloud-‐compu4ng/us/en/
l IBM Analy?cs ─ h_p://www.ibm.com/analy4cs/us/en/
l IBM MobileFirst ─ h_p://www.ibm.com/mobilefirst/us/en/
l IBM Social Business ─ h_p://www.ibm.com/social-‐business/us/en/
l IBM Security ─ h_p://www.ibm.com/security/
l IBM IoT Security Point of View ─ h_p://ibm.co/IoTSecurity
Useful Links l IBM Asset Management ─ h_ps://www.ibmserviceengage.com/asset-‐management/learn
l IBM Con?nuous Engineering ─ h_p://www.ibm.com/con4nuousengineering/us/en/
l IBM DevOps Services ─ h_p://hub.jazz.net
l IBM IoT on TwiQer ─ h_p://twi_er.com/IBMIoT ─ @IBMIoT
l IBM IoT Blog ─ h_p://ibminternetochings.tumblr.com
l IBM Big Data Hub Blog ─ h_p://ibmbigdatahub.com
For more informa?on contact:
21
Tim Hahn Office: 919.543.1366 Cell: 919.225.4083 IBM 4205 S. Miami Blvd. Durham, NC 27703 e-‐mail: [email protected] TwiQer: @hahntj
Thank You!
© 2015 IBM Corpora4on 23
Coming Soon
2016 Track 4 Techs Call for Papers August 1-‐3 The Diplomat Resort & Spa Hollywood, Florida
© 2015 IBM Corpora4on 24
Up Next
11:45 – 1:15 pm: Lunch with ChannelCon Dragons’ Den
Interna4onal Ballroom
1:30 – 2:30 pm: Building the Next Genera4on of Help Desk Support
2:45 – 3:45 pm: What’s this Open Source Thing All About?
4:00 – 5:30 pm: Technology Vendor Fair
Stevens Salon A -‐ Lower Level
6:00 – 9:00 pm: Wrigley Field Backstage Pass
ChannelCon offsite party for all registered a_endees