SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IBM Software Solution Brief
Securing the mobile
enterprise with
IBM Security solutions
Enable secure access to critical data and applications,
while mitigating the risk of mobile malware
Highlights
●● ● ●
Unlock the potential of enterprise
mobility by addressing the full spectrum
of mobile risks
●● ● ●
Secure the device, protect critical content
and applications, and enable safe mobile
transactions
●● ● ●
Extend mobile security beyond just your
employees to enable trusted transactions
with your customers and partners
●● ● ●
Deliver confidence that the mobile
environment is secure and data is safe
with an intelligent, integrated and compre-
hensive approach to mobile security
When you have a smartphone or mobile device, the world is at your
fingertips. Every day, there are new possibilities for mobile entertainment,
shopping, banking, connecting socially and getting work done. But the
speed at which mobile technology is changing has created dangerous gaps
in security, and cybercriminals have taken notice.
At the same time, addressing the increasing number and sophistication of
cyber threats is more challenging than ever. In today’s mobile enterprise,
the lines are blurred between personal and corporate assets, and IT
organizations have to do much more than simply protect a corporate-
owned device. In fact, the protection of personal data, ranging from
electronic health information to financial records, is often mandated by
evolving government regulations worldwide.
To meet these challenges, IBM has developed a comprehensive portfolio
of mobile security solutions that address four key mobile security
challenges: protecting devices, content, applications and transactions.
The portfolio also includes a unique layer of security intelligence for
advanced threat detection. IBM Security solutions emphasize an intelli-
gent, integrated and innovative approach that can help your organization
stay ahead of emerging threats, manage operational risks and lower the
cost of maintaining a strong security posture.
2
Solution BriefIBM Software
Reducing mobile security risks
Around the world, the adoption of mobile products and
services is growing exponentially. For example, nearly half of all
smartphone owners have used mobile banking in the past year,
according to a recent study conducted by the US Federal
Reserve.1 Plus, while bring-your-own-device (BYOD) programs
are increasingly popular, organizations must also secure the
mobile interactions of contract or temporary workers, business
partners, and customers. An IBM Institute of Business Value
study found that mobile devices are increasingly used for a
wide range of work activities previously restricted to desktops.
However, of the 81 percent of organizations that have personal
devices accessing their networks, only 48 percent have a
well-defined security strategy.2
The simple fact is that mobile technology has introduced
significant risks, and the threats reach far beyond lost and stolen
devices. Today’s attackers take advantage of device jailbreaking,
rooted devices, rogue applications, social engineering, mobile
malware, mobile phishing and more. IBM Business Partner
Arxan Technologies Inc. recently found that 78 percent of
the top mobile applications have been hacked.3 And with the
explosive growth of both free and paid applications, hackers
have a strong incentive to keep evolving their techniques and
attack methods.
Taking an integrated approach to mobile
security
IBM supports an intelligent, integrated and innovative approach
to addressing the security challenges bombarding today’s mobile
enterprises. The comprehensive portfolio of IBM mobile
security solutions can meet your needs for trusted, high-quality
interactions at the device, content, application and transaction
levels. In addition to helping manage containerization and app
wrapping—that is, the separation of enterprise applications
and data from personal applications and data—IBM solutions
deliver a protective layer of security intelligence for correlating
events across the enterprise and facilitating proactive responses.
This way, organizations can help prevent identity theft, reduce
the risk of fraud and protect all types of critical data.
IBM mobile security framework
Security intelligence
Transaction security
Application security
Content security
Device security
Enterprise applications
and cloud services
EnterprisePersonal and
consumer
DATA
Identity, fraud and data protection
3
Solution BriefIBM Software
Device security
Mobile devices go everywhere, making them more susceptible
than traditional, stationary systems to attack, loss, infection or
compromise. Enterprise mobile management, as a result, should
range from the enrollment and provisioning of devices, to the
monitoring of security policies and configuration compliance,
to the ability to locate the device and remotely wipe corporate
data from the device.
With MaaS360 by Fiberlink,4 an IBM company, organizations
can balance the enterprise security and employee privacy
demands of BYOD programs. The solution offers dual-persona
management for enterprise applications, secure email, web
browsing and secure document sharing—helping separate
work and personal data via containerization. Devices can
be enrolled and secured in minutes with this on-demand,
software-as-a-service solution. It also supports self-service
enrollment, customized over-the-air configuration and
automated policy enforcement.
Content security
With the increasing need for mobile productivity, organizations
are faced with the challenges of securing file and document
sharing across mobile devices. Mobile content management
should give organizations a simple, scalable way to distribute,
manage and secure documents on smartphones and tablets—
without requiring management or control of the physical
devices.
MaaS360 enables organizations to deploy a dual-persona expe-
rience from its Trusted WorkPlace container on mobile devices.
It helps provide secure access to corporate content—including
behind-the-firewall resources such as Microsoft SharePoint and
cloud repositories such as Box—while also reducing the risks of
data leakage. Individual users or documents can have their own
security policies, creating a highly personalized and compliant
experience. Security policies can restrict the copying, pasting
and sharing of sensitive data inside the container. In addition,
organizations can monitor the status and usage of specific
documents, users and devices.
Application security
Poor coding practices and human error, combined with the
relative ease with which hackers find and exploit these vulnera-
bilities, can make application security the Achilles’ heel of
enterprise security initiatives. What’s more, compromised
devices can increase the risk of fraud and create an insecure
environment for business-critical applications and transactions.
Today’s enterprises must be able to verify the security of their
own, in-house applications, while also enabling runtime risk
detection, tamper resistance and enhanced control via
“whitelisting” or “blacklisting” of applications.
IBM® Security AppScan® enables organizations to secure
native and hybrid mobile applications. It helps IT staff identify
and remediate mobile application security risks on mobile
devices as well as the servers accessed by mobile applications.
AppScan leverages extensive research of mobile operating
systems—including Google Android and Apple iOS—to
provide comprehensive security analysis. In fact, more than
40,000 mobile application programming interfaces have been
added to the AppScan security knowledgebase. AppScan runs
on popular mobile development platforms, such as Apple OS X,
which helps developers to identify application security risks
early in the software development lifecycle. This is one of the
most efficient ways to develop secure code and protect mobile
applications against data leakage.
In addition, IBM Worklight® offers organizations a secure
platform for developing, testing and managing safe HTML5,
hybrid and native mobile applications. The solution provides
an integrated development environment (IDE) that helps
4
Solution BriefIBM Software
safeguard mobile security at the device, application and network
layers. Organizations can use Worklight to protect sensitive
personal data with an encrypted offline cache, for example.
Plus, Worklight provides strong authentication mechanisms to
help ensure that only authorized users have access to protected
resources. Worklight also integrates with AppScan to make it
easy to develop and secure applications within a single IDE.
Transaction security
As mobile devices become the preferred way to get things done,
preventing unauthorized transactions by mobile users becomes
a top requirement for all organizations. But with the latest
attacks reaching across online and mobile channels, transaction
security is more challenging than ever.
Trusteer5 Mobile solutions dynamically detect the risk factors
of the underlying device. This information is delivered to the
native or web-based mobile application, as well as the applica-
tion back-end services, to help secure transactions from devices
to the back office. Application functions can be restricted based
on mobile risk assessments, or organizations can require
additional authentication if certain risk factors are detected.
Furthermore, mobile transaction risk can be correlated with
cross-channel risk factors to detect complex fraud schemes.
IBM Security Access Manager for Mobile helps organizations
deliver secure access to mobile and web applications with
authentication and authorization services, single sign-on and
session management. It helps improve identity assurance with
built-in support for flexible authentication schemes, such as
the use of one-time passwords and RSA SecurID tokens. It also
helps enforce context-aware access by integrating with Trusteer
Mobile Software Development Kit (SDK) and Worklight run-
time security features. Plus, it supports device finger printing,
geographic location awareness and IP reputation techniques.
When deployed with IBM Security Access Manager for Web,
organizations can also help shield mobile applications from
many of the common web application security risks. These
IBM solutions are available as either virtual or physical appli-
ances to help simplify configuration and deployment.
Security intelligence
With attacks on devices, applications and transactions growing
more numerous and more sophisticated by the day, it is more
important than ever for organizations to have visibility into
security events to help defeat advanced threats and spot
malicious insiders. Security intelligence and event management
(SIEM) solutions can help organizations identify trends across
the millions—or even billions—of security events collected
every day, so they can prioritize the events that require
immediate action.
IBM Security QRadar® SIEM uses event correlation to help
organizations quickly identify potential offenses and eliminate
false-positive results. Unusual user, application and network
activity can trigger automatic alerts to security teams, who can
then investigate the potential offenses and proactively manage
the remediation or mitigation. For example, when a device
normally used in the US starts accessing the network from
abroad, it could just mean an employee is travelling. However,
when this event is correlated with the transfer of hundreds of
confidential documents, the organization can quickly under-
stand that a security breach has occurred and take action.
QRadar SIEM is part of IBM QRadar Security Intelligence
Platform, a unified architecture for integrating real-time SIEM,
log management, anomaly detection, and configuration and
vulnerability management. As a result, organizations can take
advantage of advanced threat detection, ease of use and lower
cost of ownership.
5
Solution BriefIBM Software
Building security into the mobile
application development lifecycle
While mobile security is often discussed in terms of IT
management, application developers also must consider how to
build security into their application designs. Mobile application
development is faster and more iterative than traditional devel-
opment; plus, developers have to deal with multiple device
platforms and methodologies. They have to securely integrate
into back-end enterprise services as well as cloud delivery
platforms, and be ready to scale appropriately—even when
demand occurs in less predictable patterns. What’s more, there
are often unique mobile requirements to manage, such as a user
interface with significant restrictions in terms of real estate.
IBM mobile security solutions can help simplify each phase
of the mobile application development lifecycle, enabling
developers to:
●● ●
Design the optimal end-user experience across mobile devices
and application types (web, native and hybrid)
●● ●
Instrument the application for analytics, risk detection,
tamper proofing and management control
●● ●
Integrate with back-end data, systems and cloud services
●● ●
Test the application by using a vulnerability analysis tool to
scan applications and identify risks automatically
●● ●
Distribute the application using a combination of internal
and external app stores
●● ●
Manage authentication, enforced updates and versioning
●● ●
Apply risk-based analysis of business-critical transactions
●● ●
Analyze and improve the effectiveness of the application
design by viewing detailed customer usage patterns
Why IBM?
IBM mobile security solutions are part of the IBM MobileFirst
strategy of providing end-to-end solutions for the mobile
enterprise. Based on nearly 6,000 customer engagements, more
than 10 mobile-related acquisitions in the last four years, a team
of thousands of mobile experts and 270 patents in wireless
innovations, IBM MobileFirst combines the key elements of an
application and data platform with the management, security
and analytics capabilities needed for the enterprise.
For more information
To learn more about IBM mobile security strategy and solu-
tions, please contact your IBM representative or IBM Business
Partner, or visit ibm.com/mobilefirst or ibm.com/security/mobile
About IBM Security solutions
IBM Security offers one of the most advanced and integrated
portfolios of enterprise security products and services. The
portfolio, supported by world-renowned IBM X-Force®
research and development, provides security intelligence to help
organizations holistically protect their people, infrastructures,
data and applications, offering solutions for identity and access
management, database security, application development, risk
management, endpoint management, network security and
more. These solutions enable organizations to effectively
manage risk and implement integrated security for mobile,
cloud, social media and other enterprise business architectures.
IBM operates one of the world’s broadest security research,
development and delivery organizations, monitors 15 billion
security events per day in more than 130 countries, and holds
more than 3,000 security patents.
­ ­ ­
Additionally, IBM Global Financing can help you acquire
the software capabilities that your business needs in the most
cost-effective and strategic way possible. We’ll partner with
credit-qualified clients to customize a financing solution to suit
your business and development goals, enable effective cash
management, and improve your total cost of ownership. Fund
your critical IT investment and propel your business forward
with IBM Global Financing. For more information, visit:
ibm.com/financing
© Copyright IBM Corporation 2014
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
April 2014
IBM, the IBM logo, ibm.com, AppScan, QRadar, Worklight, and X-Force
are trademarks of International Business Machines Corp., registered in
many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks
is available on the web at “Copyright and trademark information” at
ibm.com/legal/copytrade.shtml
Microsoft is a trademark of Microsoft Corporation in the United States,
other countries, or both.
This document is current as of the initial date of publication and may be
changed by IBM at any time.
The client examples cited are presented for illustrative purposes only.
Actual performance results may vary depending on specific configurations
and operating conditions.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED
“AS IS” WITHOUT ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING WITHOUT ANY WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant
that its services or products will ensure that the client is in compliance with
any law or regulation.
Statement of Good Security Practices: IT system security involves
protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed or
misappropriated or can result in damage to or misuse of your systems,
including to attack others. No IT system or product should be considered
completely secure and no single product or security measure can be
completely effective in preventing improper access. IBM systems and
products are designed to be part of a comprehensive security approach,
which will necessarily involve additional operational procedures, and may
require other systems, products or services to be most effective. IBM does
not warrant that systems and products are immune from the malicious or
illegal conduct of any party.
1 Deirdre Fernandes, “Banks struggle to keep up with mobile demand,”
The Boston Globe, July 14, 2013. https://www.bostonglobe.com/
business/2013/07/13/mobile-apps-gain-popularity-banks-try-keep/
qshfqhvKts7DlGZfAoF76K/story.html
2 IBM Institute for Business Value and Oxford Economics, “The
‘upwardly mobile’ enterprise: Setting the strategic agenda,” IBM Corp.,
October 2013. http://www.oxfordeconomics.com/Media/Default/
Thought%20Leadership/white%20papers/IBM%20upwardly%20mobile/
2013_10_02_5650_Full_Report__The_upwardly_mo.pdf
3 Arxan, “State of Security in the App Economy: ‘Mobile Apps Under
Attack,” Arxan Research Report, Volume 2, 2013. https://www.arxan.com/
assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf
4 Fiberlink Communications was acquired by IBM in December of 2013.
5 Trusteer, Ltd. was acquired by IBM in September of 2013.
WGS03019-USEN-00­ ­
	
	
	
	
­ ­
	
	
	
	
	
	
­ ­ ­
­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­
­
­ ­ ­ ­ ­
­ ­ ­
­ ­ ­
­ ­ ­
Please Recycle
­

Contenu connexe

En vedette

Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Mostafa ElGhamrawy
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casingsDr. IRSHAD A
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Thales e-Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerSaikat Chaudhuri
 
The munoz migration - geography family tree1
The munoz migration - geography family tree1The munoz migration - geography family tree1
The munoz migration - geography family tree1pmunoz01
 
IT Next January 2010 Issue
IT Next January 2010 IssueIT Next January 2010 Issue
IT Next January 2010 IssueShashwat DC
 
The Creditsafe Commercial Credit Managment Suite
The Creditsafe Commercial Credit Managment Suite The Creditsafe Commercial Credit Managment Suite
The Creditsafe Commercial Credit Managment Suite CreditsafeUK
 
Spain 7 Getting Started
Spain 7 Getting StartedSpain 7 Getting Started
Spain 7 Getting StartedSUDIPTO BOSE
 
Coal mines bill, 2015, India
Coal mines bill, 2015, IndiaCoal mines bill, 2015, India
Coal mines bill, 2015, Indiaatul baride
 
IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014IBM Software India
 

En vedette (17)

Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casings
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
GBNews_DEC09
GBNews_DEC09GBNews_DEC09
GBNews_DEC09
 
Unified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight ControllerUnified Security Plugin for Opendaylight Controller
Unified Security Plugin for Opendaylight Controller
 
GetBetter
GetBetterGetBetter
GetBetter
 
NREF Annual Report
NREF Annual ReportNREF Annual Report
NREF Annual Report
 
The munoz migration - geography family tree1
The munoz migration - geography family tree1The munoz migration - geography family tree1
The munoz migration - geography family tree1
 
IT Next January 2010 Issue
IT Next January 2010 IssueIT Next January 2010 Issue
IT Next January 2010 Issue
 
The Creditsafe Commercial Credit Managment Suite
The Creditsafe Commercial Credit Managment Suite The Creditsafe Commercial Credit Managment Suite
The Creditsafe Commercial Credit Managment Suite
 
ICMA Quarterly Report - FIRST QUARTER 2014
ICMA Quarterly Report - FIRST QUARTER 2014ICMA Quarterly Report - FIRST QUARTER 2014
ICMA Quarterly Report - FIRST QUARTER 2014
 
Spain 7 Getting Started
Spain 7 Getting StartedSpain 7 Getting Started
Spain 7 Getting Started
 
Coal mines bill, 2015, India
Coal mines bill, 2015, IndiaCoal mines bill, 2015, India
Coal mines bill, 2015, India
 
IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014
 
Rrgreenhandslof
RrgreenhandslofRrgreenhandslof
Rrgreenhandslof
 

Plus de IBM Security

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackIBM Security
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 

Plus de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Dernier

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 

Dernier (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 

How to Secure the Mobile Enterprise

  • 1. IBM Software Solution Brief Securing the mobile enterprise with IBM Security solutions Enable secure access to critical data and applications, while mitigating the risk of mobile malware Highlights ●● ● ● Unlock the potential of enterprise mobility by addressing the full spectrum of mobile risks ●● ● ● Secure the device, protect critical content and applications, and enable safe mobile transactions ●● ● ● Extend mobile security beyond just your employees to enable trusted transactions with your customers and partners ●● ● ● Deliver confidence that the mobile environment is secure and data is safe with an intelligent, integrated and compre- hensive approach to mobile security When you have a smartphone or mobile device, the world is at your fingertips. Every day, there are new possibilities for mobile entertainment, shopping, banking, connecting socially and getting work done. But the speed at which mobile technology is changing has created dangerous gaps in security, and cybercriminals have taken notice. At the same time, addressing the increasing number and sophistication of cyber threats is more challenging than ever. In today’s mobile enterprise, the lines are blurred between personal and corporate assets, and IT organizations have to do much more than simply protect a corporate- owned device. In fact, the protection of personal data, ranging from electronic health information to financial records, is often mandated by evolving government regulations worldwide. To meet these challenges, IBM has developed a comprehensive portfolio of mobile security solutions that address four key mobile security challenges: protecting devices, content, applications and transactions. The portfolio also includes a unique layer of security intelligence for advanced threat detection. IBM Security solutions emphasize an intelli- gent, integrated and innovative approach that can help your organization stay ahead of emerging threats, manage operational risks and lower the cost of maintaining a strong security posture.
  • 2. 2 Solution BriefIBM Software Reducing mobile security risks Around the world, the adoption of mobile products and services is growing exponentially. For example, nearly half of all smartphone owners have used mobile banking in the past year, according to a recent study conducted by the US Federal Reserve.1 Plus, while bring-your-own-device (BYOD) programs are increasingly popular, organizations must also secure the mobile interactions of contract or temporary workers, business partners, and customers. An IBM Institute of Business Value study found that mobile devices are increasingly used for a wide range of work activities previously restricted to desktops. However, of the 81 percent of organizations that have personal devices accessing their networks, only 48 percent have a well-defined security strategy.2 The simple fact is that mobile technology has introduced significant risks, and the threats reach far beyond lost and stolen devices. Today’s attackers take advantage of device jailbreaking, rooted devices, rogue applications, social engineering, mobile malware, mobile phishing and more. IBM Business Partner Arxan Technologies Inc. recently found that 78 percent of the top mobile applications have been hacked.3 And with the explosive growth of both free and paid applications, hackers have a strong incentive to keep evolving their techniques and attack methods. Taking an integrated approach to mobile security IBM supports an intelligent, integrated and innovative approach to addressing the security challenges bombarding today’s mobile enterprises. The comprehensive portfolio of IBM mobile security solutions can meet your needs for trusted, high-quality interactions at the device, content, application and transaction levels. In addition to helping manage containerization and app wrapping—that is, the separation of enterprise applications and data from personal applications and data—IBM solutions deliver a protective layer of security intelligence for correlating events across the enterprise and facilitating proactive responses. This way, organizations can help prevent identity theft, reduce the risk of fraud and protect all types of critical data. IBM mobile security framework Security intelligence Transaction security Application security Content security Device security Enterprise applications and cloud services EnterprisePersonal and consumer DATA Identity, fraud and data protection
  • 3. 3 Solution BriefIBM Software Device security Mobile devices go everywhere, making them more susceptible than traditional, stationary systems to attack, loss, infection or compromise. Enterprise mobile management, as a result, should range from the enrollment and provisioning of devices, to the monitoring of security policies and configuration compliance, to the ability to locate the device and remotely wipe corporate data from the device. With MaaS360 by Fiberlink,4 an IBM company, organizations can balance the enterprise security and employee privacy demands of BYOD programs. The solution offers dual-persona management for enterprise applications, secure email, web browsing and secure document sharing—helping separate work and personal data via containerization. Devices can be enrolled and secured in minutes with this on-demand, software-as-a-service solution. It also supports self-service enrollment, customized over-the-air configuration and automated policy enforcement. Content security With the increasing need for mobile productivity, organizations are faced with the challenges of securing file and document sharing across mobile devices. Mobile content management should give organizations a simple, scalable way to distribute, manage and secure documents on smartphones and tablets— without requiring management or control of the physical devices. MaaS360 enables organizations to deploy a dual-persona expe- rience from its Trusted WorkPlace container on mobile devices. It helps provide secure access to corporate content—including behind-the-firewall resources such as Microsoft SharePoint and cloud repositories such as Box—while also reducing the risks of data leakage. Individual users or documents can have their own security policies, creating a highly personalized and compliant experience. Security policies can restrict the copying, pasting and sharing of sensitive data inside the container. In addition, organizations can monitor the status and usage of specific documents, users and devices. Application security Poor coding practices and human error, combined with the relative ease with which hackers find and exploit these vulnera- bilities, can make application security the Achilles’ heel of enterprise security initiatives. What’s more, compromised devices can increase the risk of fraud and create an insecure environment for business-critical applications and transactions. Today’s enterprises must be able to verify the security of their own, in-house applications, while also enabling runtime risk detection, tamper resistance and enhanced control via “whitelisting” or “blacklisting” of applications. IBM® Security AppScan® enables organizations to secure native and hybrid mobile applications. It helps IT staff identify and remediate mobile application security risks on mobile devices as well as the servers accessed by mobile applications. AppScan leverages extensive research of mobile operating systems—including Google Android and Apple iOS—to provide comprehensive security analysis. In fact, more than 40,000 mobile application programming interfaces have been added to the AppScan security knowledgebase. AppScan runs on popular mobile development platforms, such as Apple OS X, which helps developers to identify application security risks early in the software development lifecycle. This is one of the most efficient ways to develop secure code and protect mobile applications against data leakage. In addition, IBM Worklight® offers organizations a secure platform for developing, testing and managing safe HTML5, hybrid and native mobile applications. The solution provides an integrated development environment (IDE) that helps
  • 4. 4 Solution BriefIBM Software safeguard mobile security at the device, application and network layers. Organizations can use Worklight to protect sensitive personal data with an encrypted offline cache, for example. Plus, Worklight provides strong authentication mechanisms to help ensure that only authorized users have access to protected resources. Worklight also integrates with AppScan to make it easy to develop and secure applications within a single IDE. Transaction security As mobile devices become the preferred way to get things done, preventing unauthorized transactions by mobile users becomes a top requirement for all organizations. But with the latest attacks reaching across online and mobile channels, transaction security is more challenging than ever. Trusteer5 Mobile solutions dynamically detect the risk factors of the underlying device. This information is delivered to the native or web-based mobile application, as well as the applica- tion back-end services, to help secure transactions from devices to the back office. Application functions can be restricted based on mobile risk assessments, or organizations can require additional authentication if certain risk factors are detected. Furthermore, mobile transaction risk can be correlated with cross-channel risk factors to detect complex fraud schemes. IBM Security Access Manager for Mobile helps organizations deliver secure access to mobile and web applications with authentication and authorization services, single sign-on and session management. It helps improve identity assurance with built-in support for flexible authentication schemes, such as the use of one-time passwords and RSA SecurID tokens. It also helps enforce context-aware access by integrating with Trusteer Mobile Software Development Kit (SDK) and Worklight run- time security features. Plus, it supports device finger printing, geographic location awareness and IP reputation techniques. When deployed with IBM Security Access Manager for Web, organizations can also help shield mobile applications from many of the common web application security risks. These IBM solutions are available as either virtual or physical appli- ances to help simplify configuration and deployment. Security intelligence With attacks on devices, applications and transactions growing more numerous and more sophisticated by the day, it is more important than ever for organizations to have visibility into security events to help defeat advanced threats and spot malicious insiders. Security intelligence and event management (SIEM) solutions can help organizations identify trends across the millions—or even billions—of security events collected every day, so they can prioritize the events that require immediate action. IBM Security QRadar® SIEM uses event correlation to help organizations quickly identify potential offenses and eliminate false-positive results. Unusual user, application and network activity can trigger automatic alerts to security teams, who can then investigate the potential offenses and proactively manage the remediation or mitigation. For example, when a device normally used in the US starts accessing the network from abroad, it could just mean an employee is travelling. However, when this event is correlated with the transfer of hundreds of confidential documents, the organization can quickly under- stand that a security breach has occurred and take action. QRadar SIEM is part of IBM QRadar Security Intelligence Platform, a unified architecture for integrating real-time SIEM, log management, anomaly detection, and configuration and vulnerability management. As a result, organizations can take advantage of advanced threat detection, ease of use and lower cost of ownership.
  • 5. 5 Solution BriefIBM Software Building security into the mobile application development lifecycle While mobile security is often discussed in terms of IT management, application developers also must consider how to build security into their application designs. Mobile application development is faster and more iterative than traditional devel- opment; plus, developers have to deal with multiple device platforms and methodologies. They have to securely integrate into back-end enterprise services as well as cloud delivery platforms, and be ready to scale appropriately—even when demand occurs in less predictable patterns. What’s more, there are often unique mobile requirements to manage, such as a user interface with significant restrictions in terms of real estate. IBM mobile security solutions can help simplify each phase of the mobile application development lifecycle, enabling developers to: ●● ● Design the optimal end-user experience across mobile devices and application types (web, native and hybrid) ●● ● Instrument the application for analytics, risk detection, tamper proofing and management control ●● ● Integrate with back-end data, systems and cloud services ●● ● Test the application by using a vulnerability analysis tool to scan applications and identify risks automatically ●● ● Distribute the application using a combination of internal and external app stores ●● ● Manage authentication, enforced updates and versioning ●● ● Apply risk-based analysis of business-critical transactions ●● ● Analyze and improve the effectiveness of the application design by viewing detailed customer usage patterns Why IBM? IBM mobile security solutions are part of the IBM MobileFirst strategy of providing end-to-end solutions for the mobile enterprise. Based on nearly 6,000 customer engagements, more than 10 mobile-related acquisitions in the last four years, a team of thousands of mobile experts and 270 patents in wireless innovations, IBM MobileFirst combines the key elements of an application and data platform with the management, security and analytics capabilities needed for the enterprise. For more information To learn more about IBM mobile security strategy and solu- tions, please contact your IBM representative or IBM Business Partner, or visit ibm.com/mobilefirst or ibm.com/security/mobile About IBM Security solutions IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force® research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents. ­ ­ ­
  • 6. Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing © Copyright IBM Corporation 2014 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America April 2014 IBM, the IBM logo, ibm.com, AppScan, QRadar, Worklight, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both. This document is current as of the initial date of publication and may be changed by IBM at any time. The client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. 1 Deirdre Fernandes, “Banks struggle to keep up with mobile demand,” The Boston Globe, July 14, 2013. https://www.bostonglobe.com/ business/2013/07/13/mobile-apps-gain-popularity-banks-try-keep/ qshfqhvKts7DlGZfAoF76K/story.html 2 IBM Institute for Business Value and Oxford Economics, “The ‘upwardly mobile’ enterprise: Setting the strategic agenda,” IBM Corp., October 2013. http://www.oxfordeconomics.com/Media/Default/ Thought%20Leadership/white%20papers/IBM%20upwardly%20mobile/ 2013_10_02_5650_Full_Report__The_upwardly_mo.pdf 3 Arxan, “State of Security in the App Economy: ‘Mobile Apps Under Attack,” Arxan Research Report, Volume 2, 2013. https://www.arxan.com/ assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf 4 Fiberlink Communications was acquired by IBM in December of 2013. 5 Trusteer, Ltd. was acquired by IBM in September of 2013. WGS03019-USEN-00­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ Please Recycle ­