SlideShare une entreprise Scribd logo
1  sur  40
Mark Skilton, Professor of Practice in Information Systems
Management, Warwick Business School, UK

Warwick Business School
Knowing where the safe zone is - Defining
perimeter access strategies for an enterprise
The modern enterprise today has many connections, relationships and
services. Information technology has enabled communication, social
communities and transactions to create opportunities for new types of
value. But this has also changed the types of risks and security issues as
bring your own device (BYOD) and the many types of cloud services have
shifted responsibilities. Do you know where the access perimeter of your
company security is? How do you define risk and value of new
technology?
What are the opportunities and challenges of new
technologies and on legacy operations?
This presentation will look at ways to define the new business – technology
boundaries and the risk and challenges of managing new technology
across these boundaries.

Warwick Business School
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Business Ecosystem
the challenges we face

Old model
Business and IT use of
software and hardware assets
Project based development
lifecycle
Platforms and networks
Transformational advisory and
governance
Security controls and audit
service monitoring

Why business ecosystems ?

New model:
Data plethora of data types
and sources
Multi-channel Service
marketplaces
Devices and “things”
Focus on intelligent processes
and monetization
Compliance and pervasive
automated monitoring of
security
Objects in the Internet of Things
There are potentially billions of objects that could connect through IP addresses and network protocols to
identify , exchange and collaborate services.

Devices

Tags, Sensors and
platforms

Products
Content
Services
Money

Places
and
Machines
Era of Internetworking - Where is
the perimeter ?
Internet

Switches

Tier 1 Networks

NSPs

Network Peering
and Interconnections

Tier 2 ISP

Tier 2 Network

IP Backbone

IXP

Examples of ISP services include email, FTP, webhosting

ISPs

Internetworking

Satellite
Public Switched
Telephone
Networks

PTSN

Tier 3 networks
(ISP)

Cable
Operators

DSL, T1, T3 Leased Lines

Wide Area
Network WAN

4G (3G LTE/SAE)
Gateways
Gateways

3G / 3.5G

Femtocell

Wifi

Gateways

InfraRed
Local
Area
Network
LAN

GPS

Bluetooth

Mobile Devices

RFID

Sensors

Proximity,
Smart Card
+ 2.5 Billion Internet Users 2013
Representing 35% World
Population

Why business ecosystems ?
1.7 billion mobile devices sold in 2012, and
6.8 billion subscriptions equivalent to 96
percent of the world population

Why business ecosystems ?
Internet video accounting for 61 % of
total internet data (cisco)

Social Media
Is driving
massive online
Video growth

Why business ecosystems ?
1 in 4 people around world use at least one
form social networking = 1.7 Billion in
2013
1 in 3 people = 2.55 billion global audience
by 2017
all the geo-tagged locations of uploaded Flickr photos by concentration.
Why business ecosystems ?
Where is the perimeter ?
No. People
in Organization

Ave No. of social
network
connections

No. Hours
Online
Formal

Yourself

No. of Devices
per person

Why business ecosystems ?

Near to you Your Network

No. of
networks

informal/formal

Your Extended Network

No. applications
and web sites
Visited, used
What is your Organization
estimated perimeter node score ?
Formal

X

Average
No. of Devices
per person

X

3

Average
No. People
in Organization

500

X

No. of
system
networks

X

informal/formal

Ave No. of
social
network
connections

X

X 3 X 300 X

No. applications
/ Web sites
Visited, used

10

13,500,000
Illustrative only
Why business ecosystems ?

X

Average
No. Hours
Online

X 5
67,500,000
What is your personal estimated
perimeter node score ?
Formal

Average
No. of Devices
per person

5

X

No. of
system
networks

Why business ecosystems ?

Ave No. of
social
network
connections

X

No. applications
/ Web sites
Visited, used

X 5 X 2000 X 10

Assume International Travel x5 per year
Assume travel 3 times per week
Assume WIFI, 3G/4G networks
Illustrative only

X

informal/formal

300,000

X

Average
No. Hours
Online

X 10
3,000,000
What is a secure perimeter ?
Controlled access
No. People
in Organization

Compliant

Why business ecosystems ?

Secure
Controlled
system
No. of Devices
networks
per person
Controlled social
network
connections

Configured/standards

Continuous
access and use
state monitoring

?
Managed
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Data is getting more complex

Structured data
Semi-structured data
Unstructured data
Data |
Increasingly
Externalized
And metadata

Your edge profile data
Your message payload
data
Your behavioral metadata
- co-presence
Your transient data –
travel in physical and
virtual space
Embedded Data shelf life
value
(“productization of data”)
Connectivity is changing
Example programmable web have collected a database of Open
APIs. Many companies use APIs to establish connectivity services with their
web sites

Open APIs
And Closed
(Proprietary)
APIs

Managed APIs can be problematic if the API specification is changes by the Provider impacting
on the users of that API. APIs are a common method for many Cloud system service connections.
Enterprise Technology is externalized
“as a service” points Protection Points System Access ports
Web access
Corporate / Private Network

Internet
Network services

Backend services
External Firewall

Devices

Network

Network

Mobile applications
Mobile Data

Internal Firewall
G
A
T
W
A
Y

APIs

Applications

Data

Active Directory
API Management gateway

Identity ?
Access provisioning

Authentication and Data Privacy ?

VPN Tunnel

Usage Policy Governance, compliance, and controls
“AS A SERVICE”
Perimeter definitions – heat mapping
Market segments
and entities

Social Network
Channels

APIs

Own data and IP

Your Enterprise Networks

3rd party data and IP

3rd party Networks

Staff, products,
Services, assets,
facilities
SPAN Of CONTROL
Risk - Impact
* USB Investment research

Federated Devices
Authorization
Management

Certification
Processes and services

“ ID Theft every 79
Seconds (*)

DR and BC
Management
Risk Scorecard
Today
Cloud
Corporate Risk
5 4

Describing risk
Risk
Management 4

5
Corporate
Reward

4
3 2

3

3

2
1
Risk Awareness
5

3

0

4

2
Risk Impact 4
Severity

2
2

4
Risk impact
Probability
Warwick Business School

Degree of
Collaboration

Information
4Security Level
Requirement
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
API Management

Examples Mashery an Intel Company, provide a secure appliance and software
system for managing API connectivity to multiple devices and services
Web GUI to manage
the API policies and use

Appliance is used to Manage
access to APIs
Cloud Aggregator Broker –
Orchestrator
Example : Mulesoft Cloud Hub – enabled integration of multi-cloud integration
Apps
Stores

Where
is the
Perimeter?
Contract
Perimeter
versus
Technical
Perimeter
Example Network Traffic Monitoring for
Virtualized compute environments
Example Net Optics Phantom Virtualization Tap
Monitoring of Inter-VM
traffic across all best-ofbreed hypervizors in
virtual computing
environments.
The Phantom Monitor
component installs in the
hypervizor for total traffic
visibility.
Use with virtual or
physical Intrusion
Detection Systems (IDSs),
protocol analyzers, layer2 and Later-3 probes, and
other devices.
Network Traffic
Monitoring Appliance
Example Intrusion Prevention System (IPS)
Example McAfee Network Security Platform
User Identification

Key Features
Threat Prevention
Botnet detection
Behavior-based analysis
Malware protection
Forensic analysis integrated
Scalable web-based management
Application Identification

Device identification
IP de-fragmentation and TCP stream
reassembly
Anomaly detection
Inspection of virtual environments
DoS and DDoS prevention
File reputation, IP reputation, Geolocation
Protocol tunnelling support , IPv6,
V4-. MPLS
Example Cloud Environment
Application Performance management
Example Compuware APM. Monitors applications across physical and virtual
networks and environments. can be deployed easily into private, public or
hybrid cloud applications via either BYOL (bring your own license) or elastic,
consumption based models.

Application response times
User Experience
Real time and synthetic load testing
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Martini model: Any IP, any device,
any time anywhere

Jericho Forum, The Open Group
Cloud “as a services” Security
Solutions
Device Security

Proxy Controls / Appliances

Device
Authentication
Security

Endpoint
Device
Management

Strong
Password
Control

Subscriber account security

API Usage
Port Network
connect
Device Connect

Fillters

Intrusion
Prevention
System (IPS)

Chargebacks
/Billing
Controls

Service
Metering
Controls

Web Store
Front

Cloud Service security Status

Anti virus
Anti Spam

Security
Information

Cloud
Service
Reporting

management
(SIM)

Data Loss
Prevention
(DLP)
Mobile
Device
Management
(MDM)

Single Signon

Wipe data
when Lost

Remote
Application
Control

Token PKI,
SSH Keys
Controls

User Group,
Directory
Management

Application
Virtualization
(Secure VDI)

Network
Monitoring

Network
Transport
Encryption
(VPN)

Hypervizor /
VM
Monitoring

Database
Monitoring

Cryptographic controls
Data
Encryption

External Example
http://wwwclouage.com

Cloud Monitoring

Identity and
Access
Management

Virtualization Isolation services
Cloud
Storage
Virtualization

Internal

Authentication / Authorization

Application
Usage
Monitoring

Service Level
Outage
Monitoring

PaaS Development and XaaS Deployment
Service
Configuration
management

Code
Version
Encryption

Code/VM
Deployment
Encryption
Overview
What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Identity is going to get much more broader and personal

The future?
Mental Health
Physiology
Dreaming
Genetics
Activity
Drugs
Drink
Sleep
Diet

The future?
The future?
The future?
The surface underneath
The security layer pervades everywhere
Enterprise operating models will need underpinned of legal
and security strategies to support and validate an increasingly
externalized business model
API Management

Network
management

Intrusion
Management
Application
Management

Identity and access
Management

Encryption
Management

Compliance and IP
Management
Holistic Governance , Risk &
Compliance for ecosystems
Security is critical in moving IT services that are potentially no longer under the enterprise control or on
premise. The following diagram looks at On-premise and Off premise security controls .
Risk
Management

Compliance

Monitoring Management

Audit

Security Governance
Personnel Security
Management

Security Policy
Management

Access Management
Identity
Management

Firewall
Management

Validate

Log, Analyze, Event management

Test
Regime

Business Continuity
Management

Availability Management
Backup
Management

Disaster Recovery
Management

Identify
Translate

Incident Management

Security Operations
Asset
Digital Rights
Management
Management

Administrationn

Privilege, Deploy, Decommission, Dispose

Encryption
Management

Security Controls
Private Network
Management

Portability Management

Secure Development/Operations
Coding Standards

Code review

Unit Test

Publish/
Versions
Conclusions

Knowing where the safe zone is - Defining perimeter access
strategies for an enterprise
Scaling of business technology will drive changes in cultural and
legal issues as data and usage shifts toward social network based
economy
Cloud enabled commodization and “on stop contract/less” but may
alter risk profile complexity
There will be a variant of technologies to manage externalized
Identity and usage access
–
–
–
–

API Management
Social network usage in processes
Data analytics for usage behaviors
A combination of both

Technologies will enable wider Identity profiles challenging legal
boundaries of access and usage
The future?
Knowing where the safe zone is  ovum october 22 2013

Contenu connexe

Tendances

Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINT
VINTlabs | The Sogeti Trendlab
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
default default
 

Tendances (20)

Fjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | AccentureFjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | Accenture
 
The Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital EconomyThe Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital Economy
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Telco 2020
Telco 2020Telco 2020
Telco 2020
 
Platforms, where the digital economy stands up
Platforms, where the digital economy stands upPlatforms, where the digital economy stands up
Platforms, where the digital economy stands up
 
Implications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOsImplications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOs
 
Defending intellectual property abroad
Defending intellectual property abroadDefending intellectual property abroad
Defending intellectual property abroad
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
FinTech 2015 Edinburgh
FinTech 2015 EdinburghFinTech 2015 Edinburgh
FinTech 2015 Edinburgh
 
Commentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform EconomyCommentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform Economy
 
Di 2021 tech-trends
Di 2021 tech-trendsDi 2021 tech-trends
Di 2021 tech-trends
 
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
 
Digital Platform Economy
Digital Platform EconomyDigital Platform Economy
Digital Platform Economy
 
Disruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 UpdateDisruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 Update
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINT
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
 
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
 
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
 

En vedette

Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
Mark Skilton
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital Ecosystem
NUS-ISS
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystems
Michael Weiss
 

En vedette (20)

Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessment
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Sap cloud ecosystem
Sap cloud ecosystemSap cloud ecosystem
Sap cloud ecosystem
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación AbiertaEcosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise Architects
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital Ecosystem
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystems
 
Ecosystems and Digital Business Models
Ecosystems and Digital Business ModelsEcosystems and Digital Business Models
Ecosystems and Digital Business Models
 
Platform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & ControlPlatform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & Control
 
Platform Strategy and Digital Ecosystems
Platform Strategy and Digital EcosystemsPlatform Strategy and Digital Ecosystems
Platform Strategy and Digital Ecosystems
 

Similaire à Knowing where the safe zone is ovum october 22 2013

Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 

Similaire à Knowing where the safe zone is ovum october 22 2013 (20)

Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Information Security
Information SecurityInformation Security
Information Security
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
 
Internet of Things Stack
Internet of Things StackInternet of Things Stack
Internet of Things Stack
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Knowing where the safe zone is ovum october 22 2013

  • 1. Mark Skilton, Professor of Practice in Information Systems Management, Warwick Business School, UK Warwick Business School
  • 2. Knowing where the safe zone is - Defining perimeter access strategies for an enterprise The modern enterprise today has many connections, relationships and services. Information technology has enabled communication, social communities and transactions to create opportunities for new types of value. But this has also changed the types of risks and security issues as bring your own device (BYOD) and the many types of cloud services have shifted responsibilities. Do you know where the access perimeter of your company security is? How do you define risk and value of new technology? What are the opportunities and challenges of new technologies and on legacy operations? This presentation will look at ways to define the new business – technology boundaries and the risk and challenges of managing new technology across these boundaries. Warwick Business School
  • 3. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 4. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 5. Business Ecosystem the challenges we face Old model Business and IT use of software and hardware assets Project based development lifecycle Platforms and networks Transformational advisory and governance Security controls and audit service monitoring Why business ecosystems ? New model: Data plethora of data types and sources Multi-channel Service marketplaces Devices and “things” Focus on intelligent processes and monetization Compliance and pervasive automated monitoring of security
  • 6. Objects in the Internet of Things There are potentially billions of objects that could connect through IP addresses and network protocols to identify , exchange and collaborate services. Devices Tags, Sensors and platforms Products Content Services Money Places and Machines
  • 7. Era of Internetworking - Where is the perimeter ? Internet Switches Tier 1 Networks NSPs Network Peering and Interconnections Tier 2 ISP Tier 2 Network IP Backbone IXP Examples of ISP services include email, FTP, webhosting ISPs Internetworking Satellite Public Switched Telephone Networks PTSN Tier 3 networks (ISP) Cable Operators DSL, T1, T3 Leased Lines Wide Area Network WAN 4G (3G LTE/SAE) Gateways Gateways 3G / 3.5G Femtocell Wifi Gateways InfraRed Local Area Network LAN GPS Bluetooth Mobile Devices RFID Sensors Proximity, Smart Card
  • 8. + 2.5 Billion Internet Users 2013 Representing 35% World Population Why business ecosystems ?
  • 9. 1.7 billion mobile devices sold in 2012, and 6.8 billion subscriptions equivalent to 96 percent of the world population Why business ecosystems ?
  • 10. Internet video accounting for 61 % of total internet data (cisco) Social Media Is driving massive online Video growth Why business ecosystems ?
  • 11. 1 in 4 people around world use at least one form social networking = 1.7 Billion in 2013 1 in 3 people = 2.55 billion global audience by 2017 all the geo-tagged locations of uploaded Flickr photos by concentration. Why business ecosystems ?
  • 12. Where is the perimeter ? No. People in Organization Ave No. of social network connections No. Hours Online Formal Yourself No. of Devices per person Why business ecosystems ? Near to you Your Network No. of networks informal/formal Your Extended Network No. applications and web sites Visited, used
  • 13. What is your Organization estimated perimeter node score ? Formal X Average No. of Devices per person X 3 Average No. People in Organization 500 X No. of system networks X informal/formal Ave No. of social network connections X X 3 X 300 X No. applications / Web sites Visited, used 10 13,500,000 Illustrative only Why business ecosystems ? X Average No. Hours Online X 5 67,500,000
  • 14. What is your personal estimated perimeter node score ? Formal Average No. of Devices per person 5 X No. of system networks Why business ecosystems ? Ave No. of social network connections X No. applications / Web sites Visited, used X 5 X 2000 X 10 Assume International Travel x5 per year Assume travel 3 times per week Assume WIFI, 3G/4G networks Illustrative only X informal/formal 300,000 X Average No. Hours Online X 10 3,000,000
  • 15. What is a secure perimeter ? Controlled access No. People in Organization Compliant Why business ecosystems ? Secure Controlled system No. of Devices networks per person Controlled social network connections Configured/standards Continuous access and use state monitoring ? Managed
  • 16. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 17. Data is getting more complex Structured data Semi-structured data Unstructured data Data | Increasingly Externalized And metadata Your edge profile data Your message payload data Your behavioral metadata - co-presence Your transient data – travel in physical and virtual space Embedded Data shelf life value (“productization of data”)
  • 18. Connectivity is changing Example programmable web have collected a database of Open APIs. Many companies use APIs to establish connectivity services with their web sites Open APIs And Closed (Proprietary) APIs Managed APIs can be problematic if the API specification is changes by the Provider impacting on the users of that API. APIs are a common method for many Cloud system service connections.
  • 19. Enterprise Technology is externalized “as a service” points Protection Points System Access ports Web access Corporate / Private Network Internet Network services Backend services External Firewall Devices Network Network Mobile applications Mobile Data Internal Firewall G A T W A Y APIs Applications Data Active Directory API Management gateway Identity ? Access provisioning Authentication and Data Privacy ? VPN Tunnel Usage Policy Governance, compliance, and controls “AS A SERVICE”
  • 20. Perimeter definitions – heat mapping Market segments and entities Social Network Channels APIs Own data and IP Your Enterprise Networks 3rd party data and IP 3rd party Networks Staff, products, Services, assets, facilities SPAN Of CONTROL
  • 21. Risk - Impact * USB Investment research Federated Devices Authorization Management Certification Processes and services “ ID Theft every 79 Seconds (*) DR and BC Management
  • 22. Risk Scorecard Today Cloud Corporate Risk 5 4 Describing risk Risk Management 4 5 Corporate Reward 4 3 2 3 3 2 1 Risk Awareness 5 3 0 4 2 Risk Impact 4 Severity 2 2 4 Risk impact Probability Warwick Business School Degree of Collaboration Information 4Security Level Requirement
  • 23. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 24. API Management Examples Mashery an Intel Company, provide a secure appliance and software system for managing API connectivity to multiple devices and services Web GUI to manage the API policies and use Appliance is used to Manage access to APIs
  • 25. Cloud Aggregator Broker – Orchestrator Example : Mulesoft Cloud Hub – enabled integration of multi-cloud integration Apps Stores Where is the Perimeter? Contract Perimeter versus Technical Perimeter
  • 26. Example Network Traffic Monitoring for Virtualized compute environments Example Net Optics Phantom Virtualization Tap Monitoring of Inter-VM traffic across all best-ofbreed hypervizors in virtual computing environments. The Phantom Monitor component installs in the hypervizor for total traffic visibility. Use with virtual or physical Intrusion Detection Systems (IDSs), protocol analyzers, layer2 and Later-3 probes, and other devices. Network Traffic Monitoring Appliance
  • 27. Example Intrusion Prevention System (IPS) Example McAfee Network Security Platform User Identification Key Features Threat Prevention Botnet detection Behavior-based analysis Malware protection Forensic analysis integrated Scalable web-based management Application Identification Device identification IP de-fragmentation and TCP stream reassembly Anomaly detection Inspection of virtual environments DoS and DDoS prevention File reputation, IP reputation, Geolocation Protocol tunnelling support , IPv6, V4-. MPLS
  • 28. Example Cloud Environment Application Performance management Example Compuware APM. Monitors applications across physical and virtual networks and environments. can be deployed easily into private, public or hybrid cloud applications via either BYOL (bring your own license) or elastic, consumption based models. Application response times User Experience Real time and synthetic load testing
  • 29. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 30. Martini model: Any IP, any device, any time anywhere Jericho Forum, The Open Group
  • 31. Cloud “as a services” Security Solutions Device Security Proxy Controls / Appliances Device Authentication Security Endpoint Device Management Strong Password Control Subscriber account security API Usage Port Network connect Device Connect Fillters Intrusion Prevention System (IPS) Chargebacks /Billing Controls Service Metering Controls Web Store Front Cloud Service security Status Anti virus Anti Spam Security Information Cloud Service Reporting management (SIM) Data Loss Prevention (DLP) Mobile Device Management (MDM) Single Signon Wipe data when Lost Remote Application Control Token PKI, SSH Keys Controls User Group, Directory Management Application Virtualization (Secure VDI) Network Monitoring Network Transport Encryption (VPN) Hypervizor / VM Monitoring Database Monitoring Cryptographic controls Data Encryption External Example http://wwwclouage.com Cloud Monitoring Identity and Access Management Virtualization Isolation services Cloud Storage Virtualization Internal Authentication / Authorization Application Usage Monitoring Service Level Outage Monitoring PaaS Development and XaaS Deployment Service Configuration management Code Version Encryption Code/VM Deployment Encryption
  • 32. Overview What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 33. Identity is going to get much more broader and personal The future?
  • 37. The surface underneath The security layer pervades everywhere Enterprise operating models will need underpinned of legal and security strategies to support and validate an increasingly externalized business model API Management Network management Intrusion Management Application Management Identity and access Management Encryption Management Compliance and IP Management
  • 38. Holistic Governance , Risk & Compliance for ecosystems Security is critical in moving IT services that are potentially no longer under the enterprise control or on premise. The following diagram looks at On-premise and Off premise security controls . Risk Management Compliance Monitoring Management Audit Security Governance Personnel Security Management Security Policy Management Access Management Identity Management Firewall Management Validate Log, Analyze, Event management Test Regime Business Continuity Management Availability Management Backup Management Disaster Recovery Management Identify Translate Incident Management Security Operations Asset Digital Rights Management Management Administrationn Privilege, Deploy, Decommission, Dispose Encryption Management Security Controls Private Network Management Portability Management Secure Development/Operations Coding Standards Code review Unit Test Publish/ Versions
  • 39. Conclusions Knowing where the safe zone is - Defining perimeter access strategies for an enterprise Scaling of business technology will drive changes in cultural and legal issues as data and usage shifts toward social network based economy Cloud enabled commodization and “on stop contract/less” but may alter risk profile complexity There will be a variant of technologies to manage externalized Identity and usage access – – – – API Management Social network usage in processes Data analytics for usage behaviors A combination of both Technologies will enable wider Identity profiles challenging legal boundaries of access and usage The future?