© 2015 IBM Corporation
IBM Security
0 IBM Security Systems© 2015 IBM Corporation
2015 Mobile Security Trends:
Are You Ready?
Jason Hardy
Market Segment Manager, Mobile Security
IBM Security Systems
David Lingenfelter
Information Security Officer, MaaS360 by Fiberlink
IBM Security
© 2015 IBM Corporation
IBM Security
1 IBM Security Systems
Agenda
What’s Happening in Mobile
Introduce the IBM Mobile Security Framework
Trends from “The State of Mobile Security Maturity”
Tackling Mobile Security with a Layered Defense
1
© 2015 IBM Corporation
IBM Security
2 IBM Security Systems
“Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs.”
“IT organizations will dedicate at
least 25% of their software
budget to mobile application
development, deployment,
and management by 2017.”
Enterprise Mobility is HOT Mobile Security is a CHALLENGE
© 2015 IBM Corporation
IBM Security
3 IBM Security Systems
3Mobile Enterprise: A 2015 HorizonWatching Trend Report
“Mobile reached a tipping point in 2014 as it solidified its position as one of the most disruptive technologies for businesses in decades. Not since the advent of the Internet has a technology forced businesses to rethink completely how they win, serve, and retain customers. The new competitive battleground is the mobile moment.” Forrester
“Enterprise mobility will continue to be one of the hottest topics in IT, and high on the list of priorities for all CIOs” Ovum
Interest in Mobile continues to grow as business professionals are increasingly using their mobile device over traditional laptops
GSMA
“Mobility spending plans are trending up, with 73% of companies planning to increase mobility spending over the next 12 months, 25% planning to spend at the same rate, and only 2% planning to spend less.” Current Analysis
“Gartner studies show that mobile devices are
increasingly becoming the first go-to device for
communications and content consumption
used by most people on the planet who can
afford such devices” Gartner
© 2015 IBM Corporation
IBM Security
4 IBM Security Systems
Mobile Security Threats Are Exploding
Mobile malware is
growing; malicious
code is infecting
more than
11.6 millionmobile devices at
any given time3
Mobile devices
and the apps we
rely on are under
attack
90% of the top
mobile apps have
been hacked4
“With the growing penetration of
mobile devices in the enterprise,
security testing and protection of
mobile applications and data
become mandatory ` Gartner
“Enterprise mobility … new systems of
engagement. These new systems
help firms empower their customers,
partners, and employees with
context-aware apps and smart
products.” Forrester
© 2015 IBM Corporation
IBM Security
6 IBM Security Systems
MobileFirst
Protect (MaaS360)
AppScan, Arxan, Trusteer M;
bile SDK
Security Access Manager
for Mobile, Trusteer Pinpoint
Extend Security Intelligence
Enterprise Applications
and Cloud Services
Identity, Fraud,
and Data Protection
Protect Content & Data
Safeguard Applications
Manage Access & Fraud
Secure the Device
DATA
Personal and Consumer
Enterprise
IBM Mobile Security Framework
QRadar Security Intelligence Platform
AirWatch, MobileIron, Good,
Citrix, Microsoft, MocanaHP Fortify, Veracode, Proguard CA, Oracle, RSA
Secure the Device Protect Content & Data Safeguard Applications Manage Access & Fraud
Provision, manage and
secure Corporate and
BYOD devices
Segregate enterprise
and personal data;
ensure shared content
is protected
Develop secure,
vulnerability free,
hardened and risk
aware applications
Secure access and
transactions for
customers, partners
and employees
Security Intelligence
A unified architecture for integrating mobile security information & event management (SIEM), log
management, anomaly detection, and configuration & vulnerability management
© 2015 IBM Corporation
IBM Security
7 IBM Security Systems
The Roadmap to Effective Mobile Security
The State of Mobile Security MaturityFindings from the ISMG Survey Sponsored by IBM
Link to report
© 2015 IBM Corporation
IBM Security
8 IBM Security Systems
Tackling Mobile Security with a Layered Defense
David Lingenfelter
@Simply_Security
© 2015 IBM Corporation
IBM Security
11 IBM Security Systems
Mobile technologies are more empowering
of employed adults use at least one personally-owned mobile device for business
Mobile workers will use at least one business-focused app this year
yearly increase in revenue from people using mobile devices to purchase items.
© 2015 IBM Corporation
IBM Security
12 IBM Security Systems
But security threats are even greater
Threats on your
employees
Threats on your
customers
of financial apps on Android have been hacked
of Top 100 Android apps have been hacked
annual cost of crime
© 2015 IBM Corporation
IBM Security
13 IBM Security Systems
Relentless Use
of Multiple Methods
Operational
Sophistication
Near Daily Leaks
of Sensitive Data
Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2014
IBM X-Force declared
Year of the
Security Breach
40% increase in reported data
breaches and incidents
500,000,000+ records were leaked, while the future
shows no sign of change
2011 2012 2013
Note: Size of circle estimates relative impact of incident in terms of cost to
business.
We are in an era of continuous breaches.
SQL
injection
Spear
phishing
DDoS Third-party
software
Physical
access
Malware XSS Watering
hole
UndisclosedAttack types
© 2015 IBM Corporation
IBM Security
14 IBM Security Systems
IT’s Role and Focus has Changed
Many different
use cases within a
single company
Corporate Owned
BYOD
Shared Devices
Cart Devices
Kiosk Devices
Data Leakage
Apps
Blacklisting
URL filtering
SharePoint/EFSS
Intranet Access
© 2015 IBM Corporation
IBM Security
15 IBM Security Systems
Mobility Is Strategic
Enterprise Mobility Management
has become a Foundation in
every Mobile Strategy
© 2015 IBM Corporation
IBM Security
16 IBM Security Systems
IBM MobileFirst Protect Layered Approach
Secure
the Device
Secure
the Content
Secure
the App
Secure
the Network
Separating Corporate and Personal Lives
© 2015 IBM Corporation
IBM Security
17 IBM Security Systems
Secure the Device
Dynamic security and
compliance features
continuously monitor devices
and take action.
© 2015 IBM Corporation
IBM Security
18 IBM Security Systems
Secure the Container: Mail & Content
An office productivity app with email, calendar, contacts, & content
© 2015 IBM Corporation
IBM Security
19 IBM Security Systems
Secure the App
Enhancing private and public app
security through (SDK or wrapping)
code libraries and policies
© 2015 IBM Corporation
IBM Security
20 IBM Security Systems
Secure the Network
A fully-functional web browser
to enable secure access to
corporate intranet sites and
enforce compliance of policies
© 2015 IBM Corporation
IBM Security
21 IBM Security Systems
IBM MobileFirst Protect Delivers an Integrated Approach
One Platform for All Your Mobile Assets
Secure Content
Collaboration
Secure
Mobile
Containers
Comprehensive
Mobile Management
Seamless
Enterprise
Access
© 2015 IBM Corporation
IBM Security
22 IBM Security Systems
Embrace The New Normal
Mobile is becoming THE IT platform
Go beyond enabling these new devices
– Mobile utilization of corporate network/resources
– Separation of corporate & personal apps/data
– App management & security (and app dev assist)
– Identity, context and more sophisticated policy
© 2015 IBM Corporation
IBM Security
23 IBM Security Systems
Wrap-up
Unlocking productivity with Apps and Content
Capabilities exists today to Enable
Take a Layered approach for Security
You can do it now,
Empower Users
Build Trust
Do it with IBM Mobile First protect
David Lingenfelter
@simply_security
© 2015 IBM Corporation
IBM Security
24 IBM Security Systems
www.ibm.com/security
© Copyright IBM Corporation 2015. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
Top Related