SlideShare une entreprise Scribd logo
1  sur  25
© 2015 IBM Corporation
The bits, bytes and business benefits
of securing your MQ environment
and messages
Morag Hughson - hughson@uk.ibm.com
Leif Davidsen – Leif_Davidsen@uk.ibm.com
IBM Hursley - UK
Agenda
 The business fundamentals of why you need to secure your MQ
environment
 What you need to know when securing your MQ environment
3AME4171 @LeifDavidsen @MoragHughson
The need for connectivity is growing
Connectivity in business
infrastructure is
increasing
• More information, more systems, more
services, deployed anywhere
Connect systems together
• Deliver timely updates of
targeted data
• Gain business insight
• Applications and data become
valuable assets, not growing
costs
New sources of data are
changing the world
• However data without
connectivity becomes a burden
not an asset
4AME4171 @LeifDavidsen @MoragHughson
Connectivity outside the enterprise – clouds,
mobile and more
Systems are dynamic – new applications, new
sources of data, new consumers of data
• The challenge of delivering data to meet
changing demands needs a flexible
infrastructure
Roll-your-own code in the applications
Increases cost, time and complexity, but can deliver the code
where you need it
Storing the data in a database or file
Creates a permanent record, but does nothing to provide
timely analysis
A messaging infrastructure can meet both needs
• Keeps the application simple and able to adapt to change
• Can deliver filtered information to consuming applications, and
also deliver to a permanent information store
5AME4171 @LeifDavidsen @MoragHughson
The realities of an increasingly connected environment
Increasing connectivity increases complexity
Complexity is not just defining, building, operating environments but complexity in
security as well
What is a secure environment for an IT system?
Connected systems are almost the definition of an insecure environment
Every system represents a point of attack/risk
Adding multiple security layers across multiple systems is likely to create an
unusable environment
Not to mention huge performance implications
66AME4171 @LeifDavidsen @MoragHughson
What are the costs of security risks
Figures used in this presentation: 2014 Cost of Data Breach Study from Ponemon Institute and IBM –See it here: https://ibm.biz/BdE5qP
77AME4171 @LeifDavidsen @MoragHughson
Pressures deflecting from security
Challenge over Complex IT systems
Simpler approach required
Speed essential
Performance of systems
Time taken to achieve desired
outcome
Pressure on skills and resources
More generalists
Fewer specialists
8
• Differences between systems
• Different rules and regulations for different countries
• Varying audit requirements between business divisions
• Security seen as burden rather than a business asset
• Focus on IT/Resource spend on positive outcomes
8AME4171 @LeifDavidsen @MoragHughson
Cost per record of data breach (per industry)
99AME4171 @LeifDavidsen @MoragHughson
Can you afford to take risks?
Your IT environment is becoming hyper-connected.
You need to secure your systems
You need to understand the risks if you don’t secure them
You need to understand the risks if you secure them inefficiently
External threats to your business
Targeted attempts
‘Mass-market’ attempts
Internal threats
Disaffected employees
Errors or poor processes
Regulatory compliance
Industry, legal or other types of rules/regulations
Business directives
Corporate directives to be met
1010AME4171 @LeifDavidsen @MoragHughson
Breakdown of the risks
Can’t simply focus on protecting from hacking – need robust processes
and end to end security approaches
1111AME4171 @LeifDavidsen @MoragHughson
Risks with an external breach
Exposure and loss of corporate data
Loss of internal and external trust in the business
Loss of reputation
Compromise of business systems and data can put at risk existing
products, and future developments
Exposure of customer information
Potential for damages
Penalties in market and from regulators
Potential for legal action if due care was not taken to protect systems
1212AME4171 @LeifDavidsen @MoragHughson
Costs to your business with a security breach
The costs of cleaning up a security breach are likely to outweigh the
costs of implementing a strong security policy
1313AME4171 @LeifDavidsen @MoragHughson
Risks with an internal breach
Were processes followed?
Was it deliberate or accidental?
What data has been exposed?
If a retailer breached, has customer data, especially payment data, been
exposed?
If a healthcare provider breached, has patient or clinical data been
affected
If a manufacturing company breached, have confidential designs or
other materials been released?
Life sciences…Aerospace….Investment bank…
1414AME4171 @LeifDavidsen @MoragHughson
The burden of proof
Being secure is not enough – you need to prove it
The most secure system in the world is nothing without being able to
pass an audit
Security is more than just authentication, authorization and encryption
Process
Logging
Records
Every step from initial configuration, through to removal of access must
be verifiable
1515AME4171 @LeifDavidsen @MoragHughson
Implications of applying security
Adds complexity to configuration, operation, maintenance
Who manages security?
What other access do they have?
Is security done globally, locally, by system?
Authentication
System specific, repository
Authorisation
Users, roles, groups?
Encryption
Data in flight? Data at rest?
Logging, auditing
Prove to yourself
Prove to auditor
1616AME4171 @LeifDavidsen @MoragHughson
Connecting your enterprise with MQ
Provides messaging services to applications and Web
services that need to exchange data and events with:
Universally supported by multiple platforms 20 years
leading in transactional message delivery
• Inherent reliable delivery and transaction control
• Native, high-speed handling of any type of message
or file
• Native lightweight capabilities for supporting remote
devices & sensors
• End-to-end advanced security
• Single point of control, visibility, and management for
all data movement
• Applications become more flexible and data movement becomes
more reliable
• Capabilities like the Coupling Facility in System z provide unique
strengths
• Extensive support through years of development, skills and
partner ecosystem extensions
• Comprehensive single solution reduces complexity of deployment
and operation
Message
Q Manager
Q Manager
Application Z
Application A
Channels
Pervasive
Device
Sensor
e.g. RFID
Regional
Office
Mobile
Phone
Petrol
Forecourt
Refinery
Branch
Office
Retail
Store
zEnterprise
Financial
Services
& Banking Manufacturing
GovernmentRetail
17AME4171 @LeifDavidsen @MoragHughson
Moving data using files is risky too
Process Risk
 Delays in transferring files impacts
collaboration with customers/partners
 Integration files that are delayed impact
SLAs
 Failure of file delivery impacts the
processes themselves
Security Risk
 Data encryption and governance of
sensitive information transmitted in files
 Inability to apply corporate security
policies to person-initiated file transfers
 No visibility over the type and sensitivity
of the data being transferred
 No ability to support audit requirements
18AME4171 @LeifDavidsen @MoragHughson
Authentication
 Digital Certificates
 Mutual or queue manager only authentication
 Encrypt and tamper proof your traffic
 User ID and Password Validation
 New in IBM MQ V8
 Use of MQ Light is gated by password validation
SSL/TLS Password Validation IP Filtering
8 8 8 8 8 8 MQ (z & Dist)
8 8 MessageSight
8 8 8 8Restricted
network
MQ Light
(S/O & Bluemix Service)
8 DataPower
8 8 8 MQ Appliance
 IP filtering
 In MQ you longer need exits, MQ V7.1 provides
CHLAUTH
 The MQ Light Service in Bluemix is on a restricted
network that only the users bound to that Bluemix
instance can connect to.
19AME4171 @LeifDavidsen @MoragHughson
Authorization
Machine specific External repository
8 8
@
MQ (z & Dist)
8 Demos only 8 MessageSight
N/A
(Single User)
8
(Bluemix Instance)
MQ Light
(S/O & Bluemix Service)
DataPower
8 Demos only 8 MQ Appliance
 Granular access control
 Covers operations by applications (e.g. put and get) and administrative tasks (e.g. alter and start)
 OAM on distributed MQ; SAF on z/OS MQ
 MQ utilises machine specific user IDs (OS IDs)
 Appliances can use machine specific user IDs for demo purposes, or for production expect use of
centralized repository of user IDs (LDAP)
 MQ Light only allows Bluemix users that are bound to that instance to have any access to the MQ
resources, but those users have no administration access.
21AME4171 @LeifDavidsen @MoragHughson
Auditing
 Keep track of who does what
 Security failures are reported to provide an audit trail
 MQ Event messages
 MessageSight log files
 MQ Light is self-service so no admin role, e.g. queues are automatically created on
first use
Security Failures Commands Issued Configuration Changes
8 via SAF 8 8 8 8 8 MQ (z & Dist)
8 8 8 MessageSight
N/A N/A N/A MQ Light
(S/O & Bluemix Service)
DataPower
8 8 8 MQ Appliance
23AME4171 @LeifDavidsen @MoragHughson
Encryption
 Hiding your valuable data from prying eyes
 Link-level encryption from SSL/TLS protocols
 End-to-end encryption from AMS
Link-level End-to-end
8 8 8 8 MQ (z & Dist)
8 MessageSight
8 MQ Light
(S/O & Bluemix Service)
8 DataPower
8 8 MQ Appliance
25AME4171 @LeifDavidsen @MoragHughson
What now?
Review your systems for currency
Are you using the latest MQ versions with the most robust features?
Are you up to date on fixpacks?
Have you applied the latest OS/firmware updates?
Do you have an end-to-end security policy
Protecting your systems
Implementing built-in MQ security features?
Protecting your messages
Implementing MQ AMS?
Do you know how to review your logs?
Work with your audit teams to ensure they are happy with your policy, process and
implementation
2727AME4171 @LeifDavidsen @MoragHughson
Notices and Disclaimers
Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any
form without written permission from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed
for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no
responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN
NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF
DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms
and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as
illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or
other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or
services available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the
views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal
or other guidance or advice to any individual participant or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to
the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions
the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or
products will ensure that the customer is in compliance with any law.
28
Notices and Disclaimers (con’t)
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly
available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
•IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business
Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON,
OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®,
PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X-
Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
Thank You
Your Feedback is
Important!
Access the InterConnect 2015
Conference CONNECT Attendee
Portal to complete your session
surveys from your smartphone,
laptop or conference kiosk.

Contenu connexe

Tendances

Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use casesLeif Davidsen
 
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
IBM Integration Bus & WebSphere MQ - High Availability & Disaster RecoveryIBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
IBM Integration Bus & WebSphere MQ - High Availability & Disaster RecoveryRob Convery
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
IBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityIBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityJamie Squibb
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0RMayo22
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationRMayo22
 
UK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITUK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITAndyHumphreys
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOpsSHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOpsRob Convery
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
 
MQ Appliance - Intro and 8.0.0.5 updates
MQ Appliance - Intro and 8.0.0.5 updatesMQ Appliance - Intro and 8.0.0.5 updates
MQ Appliance - Intro and 8.0.0.5 updatesAnthony Beardsmore
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 
Expanding your options with the MQ Appliance
Expanding your options with the MQ ApplianceExpanding your options with the MQ Appliance
Expanding your options with the MQ ApplianceAnthony Beardsmore
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedAnthony Beardsmore
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
Effective admin and development in iib
Effective admin and development in iibEffective admin and development in iib
Effective admin and development in iibm16k
 

Tendances (20)

Understanding mq deployment choices and use cases
Understanding mq deployment choices and use casesUnderstanding mq deployment choices and use cases
Understanding mq deployment choices and use cases
 
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
IBM Integration Bus & WebSphere MQ - High Availability & Disaster RecoveryIBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
IBM Integration Bus & WebSphere MQ - High Availability & Disaster Recovery
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
IBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High AvailabilityIBM Think 2018: IBM MQ High Availability
IBM Think 2018: IBM MQ High Availability
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
 
Ibm mq appliance slideshare
Ibm mq appliance slideshareIbm mq appliance slideshare
Ibm mq appliance slideshare
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager for Server Automation (Overview)
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentation
 
UK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed ITUK Integration WebSphere User Group - MultiSpeed IT
UK Integration WebSphere User Group - MultiSpeed IT
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOpsSHARE2016:  DevOps - IIB Administration for Continuous Delivery and DevOps
SHARE2016: DevOps - IIB Administration for Continuous Delivery and DevOps
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
MQ Appliance - Intro and 8.0.0.5 updates
MQ Appliance - Intro and 8.0.0.5 updatesMQ Appliance - Intro and 8.0.0.5 updates
MQ Appliance - Intro and 8.0.0.5 updates
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
Expanding your options with the MQ Appliance
Expanding your options with the MQ ApplianceExpanding your options with the MQ Appliance
Expanding your options with the MQ Appliance
 
IBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplifiedIBM MQ Appliance - Administration simplified
IBM MQ Appliance - Administration simplified
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
Effective admin and development in iib
Effective admin and development in iibEffective admin and development in iib
Effective admin and development in iib
 

En vedette

IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Secure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecuritySecure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecurityMorag Hughson
 
WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?IBM Sverige
 
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...Peter Broadhurst
 
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...Robert Parker
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsRobert Parker
 
Mq ssl channels_on_windows
Mq ssl channels_on_windowsMq ssl channels_on_windows
Mq ssl channels_on_windowskarthickmsit
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSRobert Parker
 
Design - Integration Scenarios for Hybrid Cloud
Design - Integration Scenarios for Hybrid CloudDesign - Integration Scenarios for Hybrid Cloud
Design - Integration Scenarios for Hybrid CloudLaurenWendler
 
IBM Interconnect 2016 - Hybrid Cloud Messaging
IBM Interconnect 2016 - Hybrid Cloud MessagingIBM Interconnect 2016 - Hybrid Cloud Messaging
IBM Interconnect 2016 - Hybrid Cloud MessagingRobert Nicholson
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsMarkTaylorIBM
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Sverige
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performanceMarkTaylorIBM
 
IBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryIBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryMarkTaylorIBM
 
InterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceInterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceDavid Ware
 
IBM Integration Bus High Availability Overview
IBM Integration Bus High Availability OverviewIBM Integration Bus High Availability Overview
IBM Integration Bus High Availability OverviewPeter Broadhurst
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsBiju Nair
 

En vedette (20)

IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Secure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message SecuritySecure Messages with IBM WebSphere MQ Advanced Message Security
Secure Messages with IBM WebSphere MQ Advanced Message Security
 
WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?WebSphere Connectivity & Integration: What's New in the Messaging Family?
WebSphere Connectivity & Integration: What's New in the Messaging Family?
 
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...
IBM IMPACT 2014 - AMC-1883 - Where's My Message - Analyze IBM WebSphere MQ Re...
 
Ssl2
Ssl2Ssl2
Ssl2
 
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...CTU 2017 I173 - how to transform your messaging environment to a secure messa...
CTU 2017 I173 - how to transform your messaging environment to a secure messa...
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and Applications
 
Mq ssl channels_on_windows
Mq ssl channels_on_windowsMq ssl channels_on_windows
Mq ssl channels_on_windows
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
MQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMSMQTC 2016: IBM MQ Security deep dive including AMS
MQTC 2016: IBM MQ Security deep dive including AMS
 
Design - Integration Scenarios for Hybrid Cloud
Design - Integration Scenarios for Hybrid CloudDesign - Integration Scenarios for Hybrid Cloud
Design - Integration Scenarios for Hybrid Cloud
 
IBM Interconnect 2016 - Hybrid Cloud Messaging
IBM Interconnect 2016 - Hybrid Cloud MessagingIBM Interconnect 2016 - Hybrid Cloud Messaging
IBM Interconnect 2016 - Hybrid Cloud Messaging
 
IBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platformsIBM MQ - Comparing Distributed and z/OS platforms
IBM MQ - Comparing Distributed and z/OS platforms
 
IBM Connectivity and Integration
IBM Connectivity and IntegrationIBM Connectivity and Integration
IBM Connectivity and Integration
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
 
IBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster RecoveryIBM MQ - High Availability and Disaster Recovery
IBM MQ - High Availability and Disaster Recovery
 
InterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceInterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-service
 
IBM Integration Bus High Availability Overview
IBM Integration Bus High Availability OverviewIBM Integration Bus High Availability Overview
IBM Integration Bus High Availability Overview
 
IBM MQ V9 Overview
IBM MQ V9 OverviewIBM MQ V9 Overview
IBM MQ V9 Overview
 
Websphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentalsWebsphere MQ (MQSeries) fundamentals
Websphere MQ (MQSeries) fundamentals
 

Similaire à The bits bytes and business benefits of securing your mq environment and messages final

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Building cybersecurity transparency with clients using compliance automation...
 Building cybersecurity transparency with clients using compliance automation... Building cybersecurity transparency with clients using compliance automation...
Building cybersecurity transparency with clients using compliance automation...ELEKS
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_securityJessica Hirst
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesDebbie A. Everson
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...Enterprise Management Associates
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integrationMarco Essomba
 

Similaire à The bits bytes and business benefits of securing your mq environment and messages final (20)

Case study
Case studyCase study
Case study
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Building cybersecurity transparency with clients using compliance automation...
 Building cybersecurity transparency with clients using compliance automation... Building cybersecurity transparency with clients using compliance automation...
Building cybersecurity transparency with clients using compliance automation...
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_security
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...TLS 1.3’s Fourth Anniversary:What Have We Learned About Implementation and N...
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 

Dernier

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Generic or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsBert Jan Schrijver
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 

Dernier (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Generic or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisionsGeneric or specific? Making sensible software design decisions
Generic or specific? Making sensible software design decisions
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 

The bits bytes and business benefits of securing your mq environment and messages final

  • 1. © 2015 IBM Corporation The bits, bytes and business benefits of securing your MQ environment and messages Morag Hughson - hughson@uk.ibm.com Leif Davidsen – Leif_Davidsen@uk.ibm.com IBM Hursley - UK
  • 2. Agenda  The business fundamentals of why you need to secure your MQ environment  What you need to know when securing your MQ environment 3AME4171 @LeifDavidsen @MoragHughson
  • 3. The need for connectivity is growing Connectivity in business infrastructure is increasing • More information, more systems, more services, deployed anywhere Connect systems together • Deliver timely updates of targeted data • Gain business insight • Applications and data become valuable assets, not growing costs New sources of data are changing the world • However data without connectivity becomes a burden not an asset 4AME4171 @LeifDavidsen @MoragHughson
  • 4. Connectivity outside the enterprise – clouds, mobile and more Systems are dynamic – new applications, new sources of data, new consumers of data • The challenge of delivering data to meet changing demands needs a flexible infrastructure Roll-your-own code in the applications Increases cost, time and complexity, but can deliver the code where you need it Storing the data in a database or file Creates a permanent record, but does nothing to provide timely analysis A messaging infrastructure can meet both needs • Keeps the application simple and able to adapt to change • Can deliver filtered information to consuming applications, and also deliver to a permanent information store 5AME4171 @LeifDavidsen @MoragHughson
  • 5. The realities of an increasingly connected environment Increasing connectivity increases complexity Complexity is not just defining, building, operating environments but complexity in security as well What is a secure environment for an IT system? Connected systems are almost the definition of an insecure environment Every system represents a point of attack/risk Adding multiple security layers across multiple systems is likely to create an unusable environment Not to mention huge performance implications 66AME4171 @LeifDavidsen @MoragHughson
  • 6. What are the costs of security risks Figures used in this presentation: 2014 Cost of Data Breach Study from Ponemon Institute and IBM –See it here: https://ibm.biz/BdE5qP 77AME4171 @LeifDavidsen @MoragHughson
  • 7. Pressures deflecting from security Challenge over Complex IT systems Simpler approach required Speed essential Performance of systems Time taken to achieve desired outcome Pressure on skills and resources More generalists Fewer specialists 8 • Differences between systems • Different rules and regulations for different countries • Varying audit requirements between business divisions • Security seen as burden rather than a business asset • Focus on IT/Resource spend on positive outcomes 8AME4171 @LeifDavidsen @MoragHughson
  • 8. Cost per record of data breach (per industry) 99AME4171 @LeifDavidsen @MoragHughson
  • 9. Can you afford to take risks? Your IT environment is becoming hyper-connected. You need to secure your systems You need to understand the risks if you don’t secure them You need to understand the risks if you secure them inefficiently External threats to your business Targeted attempts ‘Mass-market’ attempts Internal threats Disaffected employees Errors or poor processes Regulatory compliance Industry, legal or other types of rules/regulations Business directives Corporate directives to be met 1010AME4171 @LeifDavidsen @MoragHughson
  • 10. Breakdown of the risks Can’t simply focus on protecting from hacking – need robust processes and end to end security approaches 1111AME4171 @LeifDavidsen @MoragHughson
  • 11. Risks with an external breach Exposure and loss of corporate data Loss of internal and external trust in the business Loss of reputation Compromise of business systems and data can put at risk existing products, and future developments Exposure of customer information Potential for damages Penalties in market and from regulators Potential for legal action if due care was not taken to protect systems 1212AME4171 @LeifDavidsen @MoragHughson
  • 12. Costs to your business with a security breach The costs of cleaning up a security breach are likely to outweigh the costs of implementing a strong security policy 1313AME4171 @LeifDavidsen @MoragHughson
  • 13. Risks with an internal breach Were processes followed? Was it deliberate or accidental? What data has been exposed? If a retailer breached, has customer data, especially payment data, been exposed? If a healthcare provider breached, has patient or clinical data been affected If a manufacturing company breached, have confidential designs or other materials been released? Life sciences…Aerospace….Investment bank… 1414AME4171 @LeifDavidsen @MoragHughson
  • 14. The burden of proof Being secure is not enough – you need to prove it The most secure system in the world is nothing without being able to pass an audit Security is more than just authentication, authorization and encryption Process Logging Records Every step from initial configuration, through to removal of access must be verifiable 1515AME4171 @LeifDavidsen @MoragHughson
  • 15. Implications of applying security Adds complexity to configuration, operation, maintenance Who manages security? What other access do they have? Is security done globally, locally, by system? Authentication System specific, repository Authorisation Users, roles, groups? Encryption Data in flight? Data at rest? Logging, auditing Prove to yourself Prove to auditor 1616AME4171 @LeifDavidsen @MoragHughson
  • 16. Connecting your enterprise with MQ Provides messaging services to applications and Web services that need to exchange data and events with: Universally supported by multiple platforms 20 years leading in transactional message delivery • Inherent reliable delivery and transaction control • Native, high-speed handling of any type of message or file • Native lightweight capabilities for supporting remote devices & sensors • End-to-end advanced security • Single point of control, visibility, and management for all data movement • Applications become more flexible and data movement becomes more reliable • Capabilities like the Coupling Facility in System z provide unique strengths • Extensive support through years of development, skills and partner ecosystem extensions • Comprehensive single solution reduces complexity of deployment and operation Message Q Manager Q Manager Application Z Application A Channels Pervasive Device Sensor e.g. RFID Regional Office Mobile Phone Petrol Forecourt Refinery Branch Office Retail Store zEnterprise Financial Services & Banking Manufacturing GovernmentRetail 17AME4171 @LeifDavidsen @MoragHughson
  • 17. Moving data using files is risky too Process Risk  Delays in transferring files impacts collaboration with customers/partners  Integration files that are delayed impact SLAs  Failure of file delivery impacts the processes themselves Security Risk  Data encryption and governance of sensitive information transmitted in files  Inability to apply corporate security policies to person-initiated file transfers  No visibility over the type and sensitivity of the data being transferred  No ability to support audit requirements 18AME4171 @LeifDavidsen @MoragHughson
  • 18. Authentication  Digital Certificates  Mutual or queue manager only authentication  Encrypt and tamper proof your traffic  User ID and Password Validation  New in IBM MQ V8  Use of MQ Light is gated by password validation SSL/TLS Password Validation IP Filtering 8 8 8 8 8 8 MQ (z & Dist) 8 8 MessageSight 8 8 8 8Restricted network MQ Light (S/O & Bluemix Service) 8 DataPower 8 8 8 MQ Appliance  IP filtering  In MQ you longer need exits, MQ V7.1 provides CHLAUTH  The MQ Light Service in Bluemix is on a restricted network that only the users bound to that Bluemix instance can connect to. 19AME4171 @LeifDavidsen @MoragHughson
  • 19. Authorization Machine specific External repository 8 8 @ MQ (z & Dist) 8 Demos only 8 MessageSight N/A (Single User) 8 (Bluemix Instance) MQ Light (S/O & Bluemix Service) DataPower 8 Demos only 8 MQ Appliance  Granular access control  Covers operations by applications (e.g. put and get) and administrative tasks (e.g. alter and start)  OAM on distributed MQ; SAF on z/OS MQ  MQ utilises machine specific user IDs (OS IDs)  Appliances can use machine specific user IDs for demo purposes, or for production expect use of centralized repository of user IDs (LDAP)  MQ Light only allows Bluemix users that are bound to that instance to have any access to the MQ resources, but those users have no administration access. 21AME4171 @LeifDavidsen @MoragHughson
  • 20. Auditing  Keep track of who does what  Security failures are reported to provide an audit trail  MQ Event messages  MessageSight log files  MQ Light is self-service so no admin role, e.g. queues are automatically created on first use Security Failures Commands Issued Configuration Changes 8 via SAF 8 8 8 8 8 MQ (z & Dist) 8 8 8 MessageSight N/A N/A N/A MQ Light (S/O & Bluemix Service) DataPower 8 8 8 MQ Appliance 23AME4171 @LeifDavidsen @MoragHughson
  • 21. Encryption  Hiding your valuable data from prying eyes  Link-level encryption from SSL/TLS protocols  End-to-end encryption from AMS Link-level End-to-end 8 8 8 8 MQ (z & Dist) 8 MessageSight 8 MQ Light (S/O & Bluemix Service) 8 DataPower 8 8 MQ Appliance 25AME4171 @LeifDavidsen @MoragHughson
  • 22. What now? Review your systems for currency Are you using the latest MQ versions with the most robust features? Are you up to date on fixpacks? Have you applied the latest OS/firmware updates? Do you have an end-to-end security policy Protecting your systems Implementing built-in MQ security features? Protecting your messages Implementing MQ AMS? Do you know how to review your logs? Work with your audit teams to ensure they are happy with your policy, process and implementation 2727AME4171 @LeifDavidsen @MoragHughson
  • 23. Notices and Disclaimers Copyright © 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. 28
  • 24. Notices and Disclaimers (con’t) Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. •IBM, the IBM logo, ibm.com, Bluemix, Blueworks Live, CICS, Clearcase, DOORS®, Enterprise Document Management System™, Global Business Services ®, Global Technology Services ®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, SoDA, SPSS, StoredIQ, Tivoli®, Trusteer®, urban{code}®, Watson, WebSphere®, Worklight®, X- Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 25. Thank You Your Feedback is Important! Access the InterConnect 2015 Conference CONNECT Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.

Notes de l'éditeur

  1. Every client we talk to today is looking to do more. Now in many cases a lot of it will be doing more with less – but always there is a need to do more – and at the heart of everything is connectivity. Connecting systems, connecting services – and essentially what they are looking to do is to connect sources of information. There are new information sources springing up everywhere – and it is these new sources of data that are changing the world – creating new data to bring value to businesses – but unless this data is moved from where it is created to where it can be consumed to add value to the business then it is simply a burden to the business. So what is really important is that our clients need to connect systems together, ensuring newly created data is delivered to where it can provide value – and that is likely to be as soon as possible – just when it is created – that will create timely business insight to deliver value to the business – and then all this new data is no longer a burden, but instead it is a valuable asset.
  2. So – for all this data to be created and consumed – what needs to happen. Especially given that just as new sources of data spring up quickly – so do the systems that consume them – and these are also likely to change – grow – and even disappear. So what is the best way to move this data, to deliver the value, but without overly burdening the infrastructure and application teams. Because if we try to move the data in the application, through even simply custom coding, then it will slow the coders down, add complexity and errors, increases costs for development and maintenance. So although you might end up with a solution – it is a solution you will need to keep changing – and the coders better have catered for all the possible failure scenarios for the movement of data. Maybe it is simpler to just dump it to disk – maybe a file or database – but that will slow things down – won’t deliver it as it is created to an application and adds to the problem of data without adding value. A better solution is to use a messaging infrastructure – a common set of APIs for the application to use to package and move the data – data which can be deliver to consuming applications quickly, simply, reliably and securely – even based on filters, and distribution mechanisms like publish subscribe which can ensure the right information can be delivered to the right consumer – helping to reduce the burden of processing all the data – and delivering more data faster.
  3. As we just covered MQ provides guaranteed, assured messaging that provides transactional integrity with the speed and security that any enterprise will need for mission critical applications. E.g., transactions at a bank, money movement in finance sector, retailer processing of payment card or purchase details, border security and immigration processing, moving data through factories and in and out of ERP systems MQ enables you to connect applications and services together with valuable qualities-of-service. Applications can exchange information without tying themselves up – just like email where people communication a-synchronously. MQ has been doing all this for years – we have 10000+ customers who have built their businesses around it – and rely on it not just every day – but every second. It helps their businesses be more flexible, more reliable and more secure. Deployments on platforms like System z with its coupling facility helps customers to be robust and recover from failures without interrupting their processing – and we have hundreds if not thousands of partners and skilled practioners to support these deployments – as well as big teams in IBM enhancing the product and delivering major new updates – such as the new IBM MQ V8.
  4. What we are therefore talking about with file transfers is in fact risk – the risk to your business process, the security risk, and the fundamental risk to your business when you use FTP to move your data without effective controls in place and without it being well integrated and controlled as part of your business, linked to your applications, linked to your business processes, and linked to your management controls and dashboards. To avoid or at least to manage and reduce these risks, IBM has a Managed File Transfer solution to help you address these risks – to help you better provide your processes with the right data at the right time. And also to ensure the security of your data doesn’t compromised your business and your customer’s trust in you to handle their data securely.