SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
© 2014 CA. All rights reserved.
5 Steps for End-to-End Mobile App
Security with Consumer Apps
February 20, 2014
Tyson Whitten
Mobile Security Product Marketing - CA Technologies
Leif Bildoy
CA Layer 7 Product Management - CA Technologies
2 © 2014 CA. All rights reserved.
Housekeeping
Tyson Whitten
CA Technologies
Tyson.Whitten@ca.com
Layer 7 & CATechnologies
@layer7 & @CASecurity
layer7.com/blogs
layer7.com & security.com
Leif Bildoy
CA Technologies
Leif.Bildoy@ca.com
Chat questions into the
sidebar or use hashtag:
#L7webinar
3 © 2014 CA. All rights reserved.
Mobile Growth Continues
Mobile app revenue
generated by 2017
$77B
??
... It’s An App, Happy World
• Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie
Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013.
4 © 2014 CA. All rights reserved.
Mobile Growth Continues
Mobile app
downloads
by 2017
268B
... It’s An App, Happy World
• Harvard Business Review, “For Mobile Devices, Think Apps, Not Ads”, Sunil Gupta, Head of HBR Marketing. March 2013.
• Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie
Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013.
Time spent with apps
vs. browsers
82%
Average apps per
device
40
5 © 2014 CA. All rights reserved.
Everyone is working on a mobility revenue strategy
Device GPS
RealQuest.com
DiverseSolutions.com
WalkScore.comGeoScan.com
Owner Input
Zillow Mobile App
6 © 2014 CA. All rights reserved.
Mobility Form Factors Power Innovation
Nike+ Mobile App
7 © 2014 CA. All rights reserved.
Consumer App Security Risks
Protected Health Information
(PHI)
sync
8 © 2014 CA. All rights reserved.
How to Achieve End-to-End Security for Consumer Apps
 App Risk
 Understanding the Solution Landscape
 Securing the backend
 Protecting the app
 Maintaining the user experience
9 © 2014 CA. All rights reserved.
Step #1: Identify Risk Level of Your Apps
IP, NPI,
PHI & PII
Risk level = Business impact Likelihood of a threat
WHO
WHERE
WHAT
Likelihood of a threat
Business impact
10 © 2014 CA. All rights reserved.
What Consumer App Security Solutions are Available?
Control the App by controlling the device
11 © 2014 CA. All rights reserved.
Step #2: Understand Where MDM/MAM Fits
Features Enterprise Consumer
Authentication  
Authorization  
Social Login  
SSO  
Encryption (in-
motion, at-
rest)
 
12 © 2014 CA. All rights reserved.
Step #2: Understand Where MDM/MAM Fits
BYOD Policies not for Consumer Scenarios
Features Enterprise Consumer
Authentication  
Authorization  
Social Login  
SSO  
Encryption (in-
motion, at-
rest)
 
Device
Management
Policies
(camera, GPS,
etc)
 -
13 © 2014 CA. All rights reserved.
What does that leave for App Solutions?
Web API
Native AppWeb Browser
14 © 2014 CA. All rights reserved.
Understanding APIs are Core to Consumer Apps
Web API
Native AppWeb Browser
15 © 2014 CA. All rights reserved.
Step #3: Securing the App starting with the API
Developer
Access
Malicious Apps
Threats
Composite Apps
Performance
16 © 2014 CA. All rights reserved.
What about the Other End?
API
API
API
17 © 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security
User
Apps
Devices
18 © 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security
User
Apps
Devices
Name
Email
Phone
number
Address
Group
Password
Package
name
Name
Signer
HW
Accelerated
Permissions
HW version
SW version
App mix
Group
Managed
Footprint
Screen
Size
SW
AppID
UserID
DeviceID
19 © 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security
User
Apps
Devices
Name
Email
UserID
Phone
number
Address
Group
Martial
Status
Password
Package
name
Name
HW version
SW version
Screen
Size
AppID
Social
Graph
DeviceID
20 © 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security
A B C
username/password
Access Token/Refresh Token
Per app
Authorization
Server
OAuth + OpenID Connect + PKI
 Profiled for mobile
 Clear distinction between device, user and app
MAG
Signed Cert
Certificate Signing
Request
ID Token (JWT Or
SM Session Cookie
21 © 2014 CA. All rights reserved.
Step #4: How Secure App Development Complements API
Security
Two-factor Auth
Social Login
Single Sign-On
22 © 2014 CA. All rights reserved.
Securing the Mobile App to the Backend API
Mutual SSL
API
API
API
Two-factor Auth
Social Login
Single Sign-On
Fine-grained API
Access Control
Threat Protection
Mutual SSL
23 © 2014 CA. All rights reserved.
Step #5: How the Right End-to-End Mobile Security
Solution Improves the User Experience
A B C SSO
Social
Login
APIs
API
The Right Combination of Content & Security Features
24 © 2014 CA. All rights reserved.
Mobile Access Gateway
25 © 2014 CA. All rights reserved.
Mobile SDK – Simplified & secure consumption of APIs
 Leverage mobile OS security to create a
secure sign-on container
 Standards based OAuth 2.0, OpenID Connect,
and JWT
 Secure provisioning through CA Layer 7
Mobile Access Gateway
 Client-side libraries implementing common
security aspects
– iOS 6/7, Android 4.x & Adobe PhoneGap
– Easy-to-use device API for adding app to
SSO session and mutual SSL
– Single API call to leverage cryptographic
security, OAuth, OpenID Connect, and
JWT
– SDK with sample code & documentation
Layer 7 Mobile Single Sign On Solution is
a complete end-to-end standards-based
security solution.
26 © 2014 CA. All rights reserved.
CA Technologies Provides Unique Capabilities to Meet
the Evolving Needs of the Open Enterprise
Balance Security and User
Convenience
End-to-End Mobile Security
Accelerate secure application
delivery: Build, Deploy & Secure
Convenience
Questions?
28 © 2014 CA. All rights reserved.
Copyright © 2014 CA. The Windows logo is either a registered trademark or trademark of Microsoft Corporation in the United States
and/or other countries. The Symantec is either a registered trademark or trademark of Symantec Corporation in the United States
and/or other countries. The Good logo is either a registered trademark or trademark of Good Corporation in the United States and/or
other countries. The Airwatch logo is either a registered trademark or trademark of Airwatch Corporation in the United States and/or
other countries. The MobileIron logo is either a registered trademark or trademark of MobileIron Corporation in the United States
and/or other countries. The Samsung logo is either a registered trademark or trademark of Samsung Corporation in the United States
and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
Certain information in this publication may outline CA’s general product direction. However, CA may make modifications to any CA
product, software program, method or procedure described in this publication at any time without notice, and the development,
release and timing of any features or functionality described in this publication remain at CA’s sole discretion. CA will support only the
referenced products in accordance with (i) the documentation and specifications provided with the referenced product, and (ii)CA’s
then-current maintenance and support policy for the referenced product. Notwithstanding anything in this publication to the contrary,
this publication shall not: (i) constitute product documentation or specifications under any existing or future written license
agreement or services agreement relating to any CA software product, or be subject to any warranty set forth in any such written
agreement; (ii) serve to affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement
or services agreement relating to any CA software product; or (iii) serve to amend any product documentation or specifications for any
CA software product.
THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of
the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY
KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation,
including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly
advised in advance of the possibility of such damages.

Contenu connexe

Tendances

CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerRajat Vijayvargiya
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointCA API Management
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management SolutionCA API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...CA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management SeminarCA API Management
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideCA Technologies
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...Akana
 
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014CA API Management
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
API Management in Digital Transformation
API Management in Digital TransformationAPI Management in Digital Transformation
API Management in Digital TransformationAditya Thatte
 
Enterprise API Adoption Patterns
Enterprise API Adoption PatternsEnterprise API Adoption Patterns
Enterprise API Adoption PatternsAkana
 

Tendances (20)

CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management Solution
 
5 pillars of API Management
5 pillars of API Management5 pillars of API Management
5 pillars of API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management Seminar
 
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelMobile Risk Analysis: Take Your Mobile App Security to the Next Level
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
 
CA API Gateway
CA API GatewayCA API Gateway
CA API Gateway
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
A New Breed of Technical Leaders: The 101 to Defining Your API Business Stra...
 
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014APIs: State of the Union - Ross Garrett @ AppsWorld 2014
APIs: State of the Union - Ross Garrett @ AppsWorld 2014
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
API Management in Digital Transformation
API Management in Digital TransformationAPI Management in Digital Transformation
API Management in Digital Transformation
 
Enterprise API Adoption Patterns
Enterprise API Adoption PatternsEnterprise API Adoption Patterns
Enterprise API Adoption Patterns
 
Definitive Guide to API Management
Definitive Guide to API ManagementDefinitive Guide to API Management
Definitive Guide to API Management
 

En vedette

Gestion des APIs avec Azure API Management - Samir AREZKI
Gestion des APIs avec Azure API Management - Samir AREZKIGestion des APIs avec Azure API Management - Samir AREZKI
Gestion des APIs avec Azure API Management - Samir AREZKISamir Arezki ☁
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Donnez de l'agilité à votre système d'information avec Azure
Donnez de l'agilité à votre système d'information avec AzureDonnez de l'agilité à votre système d'information avec Azure
Donnez de l'agilité à votre système d'information avec AzureSamir Arezki ☁
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 

En vedette (12)

Gestion des APIs avec Azure API Management - Samir AREZKI
Gestion des APIs avec Azure API Management - Samir AREZKIGestion des APIs avec Azure API Management - Samir AREZKI
Gestion des APIs avec Azure API Management - Samir AREZKI
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Donnez de l'agilité à votre système d'information avec Azure
Donnez de l'agilité à votre système d'information avec AzureDonnez de l'agilité à votre système d'information avec Azure
Donnez de l'agilité à votre système d'information avec Azure
 
Layer 7 and Oracle -
Layer 7 and Oracle - Layer 7 and Oracle -
Layer 7 and Oracle -
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
Oracle API Gateway
Oracle API GatewayOracle API Gateway
Oracle API Gateway
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 

Similaire à 5 steps end to end security consumer apps

5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer AppsCA API Management
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsCA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless WorkplaceCA Technologies
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammerOur Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammeriProgrammer Solutions
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowNarola Infotech
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Security
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditCompliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditNowSecure
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile Users
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile UsersDevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile Users
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile UsersCA Technologies
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Luca Rossetti
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019Boonpoj Thongakaraniroj
 
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 MistakesMobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakesyonster
 
Omnego Quick Intro
Omnego Quick IntroOmnego Quick Intro
Omnego Quick IntroOmnego
 

Similaire à 5 steps end to end security consumer apps (20)

5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammerOur Journey of Mobile App Development for Vodafone Idea | iProgrammer
Our Journey of Mobile App Development for Vodafone Idea | iProgrammer
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next auditCompliance in the mobile enterprise: 5 tips to prepare for your next audit
Compliance in the mobile enterprise: 5 tips to prepare for your next audit
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile Users
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile UsersDevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile Users
DevOps for Mobile: Delivering a 5-Star App Experience to Your Mobile Users
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
ANTI-ANTI-CODE-MODIFICATION MiSSConf(SP5) 2019
 
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 MistakesMobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
Mobile Pharma: When 'Go Mobile' Goes Wrong - Top 9 Mistakes
 
Go Mobile with SAP Cloud Platform
Go Mobile with SAP Cloud PlatformGo Mobile with SAP Cloud Platform
Go Mobile with SAP Cloud Platform
 
Omnego Quick Intro
Omnego Quick IntroOmnego Quick Intro
Omnego Quick Intro
 

Plus de CA API Management

Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?CA API Management
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureCA API Management
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...CA API Management
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...CA API Management
 

Plus de CA API Management (8)

Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
 

5 steps end to end security consumer apps

  • 1. © 2014 CA. All rights reserved. 5 Steps for End-to-End Mobile App Security with Consumer Apps February 20, 2014 Tyson Whitten Mobile Security Product Marketing - CA Technologies Leif Bildoy CA Layer 7 Product Management - CA Technologies
  • 2. 2 © 2014 CA. All rights reserved. Housekeeping Tyson Whitten CA Technologies Tyson.Whitten@ca.com Layer 7 & CATechnologies @layer7 & @CASecurity layer7.com/blogs layer7.com & security.com Leif Bildoy CA Technologies Leif.Bildoy@ca.com Chat questions into the sidebar or use hashtag: #L7webinar
  • 3. 3 © 2014 CA. All rights reserved. Mobile Growth Continues Mobile app revenue generated by 2017 $77B ?? ... It’s An App, Happy World • Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013.
  • 4. 4 © 2014 CA. All rights reserved. Mobile Growth Continues Mobile app downloads by 2017 268B ... It’s An App, Happy World • Harvard Business Review, “For Mobile Devices, Think Apps, Not Ads”, Sunil Gupta, Head of HBR Marketing. March 2013. • Gartner. “Predicts 2014: Apps, Personal Cloud and Data Analytics Will Drive New Consumer Interactions.” Stephanie Baghdassarian, Brian Blau, Jessica Ekholm, Sandy Shen. November 22, 2013. Time spent with apps vs. browsers 82% Average apps per device 40
  • 5. 5 © 2014 CA. All rights reserved. Everyone is working on a mobility revenue strategy Device GPS RealQuest.com DiverseSolutions.com WalkScore.comGeoScan.com Owner Input Zillow Mobile App
  • 6. 6 © 2014 CA. All rights reserved. Mobility Form Factors Power Innovation Nike+ Mobile App
  • 7. 7 © 2014 CA. All rights reserved. Consumer App Security Risks Protected Health Information (PHI) sync
  • 8. 8 © 2014 CA. All rights reserved. How to Achieve End-to-End Security for Consumer Apps  App Risk  Understanding the Solution Landscape  Securing the backend  Protecting the app  Maintaining the user experience
  • 9. 9 © 2014 CA. All rights reserved. Step #1: Identify Risk Level of Your Apps IP, NPI, PHI & PII Risk level = Business impact Likelihood of a threat WHO WHERE WHAT Likelihood of a threat Business impact
  • 10. 10 © 2014 CA. All rights reserved. What Consumer App Security Solutions are Available? Control the App by controlling the device
  • 11. 11 © 2014 CA. All rights reserved. Step #2: Understand Where MDM/MAM Fits Features Enterprise Consumer Authentication   Authorization   Social Login   SSO   Encryption (in- motion, at- rest)  
  • 12. 12 © 2014 CA. All rights reserved. Step #2: Understand Where MDM/MAM Fits BYOD Policies not for Consumer Scenarios Features Enterprise Consumer Authentication   Authorization   Social Login   SSO   Encryption (in- motion, at- rest)   Device Management Policies (camera, GPS, etc)  -
  • 13. 13 © 2014 CA. All rights reserved. What does that leave for App Solutions? Web API Native AppWeb Browser
  • 14. 14 © 2014 CA. All rights reserved. Understanding APIs are Core to Consumer Apps Web API Native AppWeb Browser
  • 15. 15 © 2014 CA. All rights reserved. Step #3: Securing the App starting with the API Developer Access Malicious Apps Threats Composite Apps Performance
  • 16. 16 © 2014 CA. All rights reserved. What about the Other End? API API API
  • 17. 17 © 2014 CA. All rights reserved. Step #4: How Secure App Development Complements API Security User Apps Devices
  • 18. 18 © 2014 CA. All rights reserved. Step #4: How Secure App Development Complements API Security User Apps Devices Name Email Phone number Address Group Password Package name Name Signer HW Accelerated Permissions HW version SW version App mix Group Managed Footprint Screen Size SW AppID UserID DeviceID
  • 19. 19 © 2014 CA. All rights reserved. Step #4: How Secure App Development Complements API Security User Apps Devices Name Email UserID Phone number Address Group Martial Status Password Package name Name HW version SW version Screen Size AppID Social Graph DeviceID
  • 20. 20 © 2014 CA. All rights reserved. Step #4: How Secure App Development Complements API Security A B C username/password Access Token/Refresh Token Per app Authorization Server OAuth + OpenID Connect + PKI  Profiled for mobile  Clear distinction between device, user and app MAG Signed Cert Certificate Signing Request ID Token (JWT Or SM Session Cookie
  • 21. 21 © 2014 CA. All rights reserved. Step #4: How Secure App Development Complements API Security Two-factor Auth Social Login Single Sign-On
  • 22. 22 © 2014 CA. All rights reserved. Securing the Mobile App to the Backend API Mutual SSL API API API Two-factor Auth Social Login Single Sign-On Fine-grained API Access Control Threat Protection Mutual SSL
  • 23. 23 © 2014 CA. All rights reserved. Step #5: How the Right End-to-End Mobile Security Solution Improves the User Experience A B C SSO Social Login APIs API The Right Combination of Content & Security Features
  • 24. 24 © 2014 CA. All rights reserved. Mobile Access Gateway
  • 25. 25 © 2014 CA. All rights reserved. Mobile SDK – Simplified & secure consumption of APIs  Leverage mobile OS security to create a secure sign-on container  Standards based OAuth 2.0, OpenID Connect, and JWT  Secure provisioning through CA Layer 7 Mobile Access Gateway  Client-side libraries implementing common security aspects – iOS 6/7, Android 4.x & Adobe PhoneGap – Easy-to-use device API for adding app to SSO session and mutual SSL – Single API call to leverage cryptographic security, OAuth, OpenID Connect, and JWT – SDK with sample code & documentation Layer 7 Mobile Single Sign On Solution is a complete end-to-end standards-based security solution.
  • 26. 26 © 2014 CA. All rights reserved. CA Technologies Provides Unique Capabilities to Meet the Evolving Needs of the Open Enterprise Balance Security and User Convenience End-to-End Mobile Security Accelerate secure application delivery: Build, Deploy & Secure Convenience
  • 28. 28 © 2014 CA. All rights reserved. Copyright © 2014 CA. The Windows logo is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. The Symantec is either a registered trademark or trademark of Symantec Corporation in the United States and/or other countries. The Good logo is either a registered trademark or trademark of Good Corporation in the United States and/or other countries. The Airwatch logo is either a registered trademark or trademark of Airwatch Corporation in the United States and/or other countries. The MobileIron logo is either a registered trademark or trademark of MobileIron Corporation in the United States and/or other countries. The Samsung logo is either a registered trademark or trademark of Samsung Corporation in the United States and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. Certain information in this publication may outline CA’s general product direction. However, CA may make modifications to any CA product, software program, method or procedure described in this publication at any time without notice, and the development, release and timing of any features or functionality described in this publication remain at CA’s sole discretion. CA will support only the referenced products in accordance with (i) the documentation and specifications provided with the referenced product, and (ii)CA’s then-current maintenance and support policy for the referenced product. Notwithstanding anything in this publication to the contrary, this publication shall not: (i) constitute product documentation or specifications under any existing or future written license agreement or services agreement relating to any CA software product, or be subject to any warranty set forth in any such written agreement; (ii) serve to affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (iii) serve to amend any product documentation or specifications for any CA software product. THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages.