+ All Categories
Home > Software > IBM Seguridad Móvil - Acompaña tu estrategia BYOD

IBM Seguridad Móvil - Acompaña tu estrategia BYOD

Date post: 22-Jan-2018
Category:
Upload: camilo-fandino-gomez
View: 154 times
Download: 4 times
Share this document with a friend
33
© 2015 IBM Corporation Enabling the enterprise for the way the world works Presenter Title IBM Security June 13, 2016 IBM Mobile Security
Transcript
Page 1: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

copy 2015 IBM Corporation

Enabling the enterprise for the way the world works

PresenterTitleIBM Security

June 13 2016

IBM Mobile Security

2copy 2015 IBM Corporation

by 2017

Mobile downloads

will increase to

268 billionGartner

by 2016

The number of smartphone

users worldwide will surpass

2 billioneMarketer

Enterprise mobile trends

ldquoEnterprise mobility will continue to be one of the hottest topics in ITand high on the list of priorities for all CIOsrdquo

Ovum

ldquoIT organizations will dedicate at least 25 of their software budget

to mobile application development deployment and management by 2017rdquoIDC

3copy 2015 IBM Corporation

387new threats

every minute or more than six every second

McAfee

As mobile grows so do security threats

ldquoWith the growing penetration of mobile devices in the enterprise security testing

and protection of mobile applications and data become mandatoryrdquo Gartner

ldquoEnterprise mobilityhellip new systems of engagement

These new systems help firms empower their customers partners

and employees with context-aware apps and smart productsrdquoForrester

Arxan

Top mobile devicesand apps hacked 97

Android

87iOS

4copy 2015 IBM Corporation

What concerns does this create for the enterprise

Source 2014 Information Security Media Group Survey ldquoThe State of Mobile Security Maturityrdquo

32 are concerned about fraudulent transactions

Only 18 can detect malware jailbreaks

52 worry aboutapplication vulnerabilities

Only 23 have tamper-proofing capabilities

50 are content and data leakage are their top security concern

60 use secure containersfor data security

57 say a lost or stolen device is top concern

60 use passcodesfor device security

5copy 2015 IBM Corporation

MobileFirst

Protect (MaaS360)

AppScan Arxan Trusteer M

bile SDK

IBM Mobile Security Framework

AirWatch MobileIron Good

Citrix Microsoft MocanaHP Fortify Veracode Proguard CA Oracle RSA

bull Manage multi-OS BYOD environment

bull Mitigate risks of lost and compromised devices

bull Separate enterprise and personal data

bull Enforce compliance with security policies

bull Distribute and control enterprise apps

bull Build and secure apps and protect them ldquoin the wildrdquo

bull Provide secure web mobile API access and identify device risk

bull Meet authentication ease-of-use expectation

Extend Security Intelligence

bull Extend security information and event management (SIEM) to mobile platform

bull Incorporate mobile log management anomaly detection configuration and vulnerability management

Manage Access and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 2: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

2copy 2015 IBM Corporation

by 2017

Mobile downloads

will increase to

268 billionGartner

by 2016

The number of smartphone

users worldwide will surpass

2 billioneMarketer

Enterprise mobile trends

ldquoEnterprise mobility will continue to be one of the hottest topics in ITand high on the list of priorities for all CIOsrdquo

Ovum

ldquoIT organizations will dedicate at least 25 of their software budget

to mobile application development deployment and management by 2017rdquoIDC

3copy 2015 IBM Corporation

387new threats

every minute or more than six every second

McAfee

As mobile grows so do security threats

ldquoWith the growing penetration of mobile devices in the enterprise security testing

and protection of mobile applications and data become mandatoryrdquo Gartner

ldquoEnterprise mobilityhellip new systems of engagement

These new systems help firms empower their customers partners

and employees with context-aware apps and smart productsrdquoForrester

Arxan

Top mobile devicesand apps hacked 97

Android

87iOS

4copy 2015 IBM Corporation

What concerns does this create for the enterprise

Source 2014 Information Security Media Group Survey ldquoThe State of Mobile Security Maturityrdquo

32 are concerned about fraudulent transactions

Only 18 can detect malware jailbreaks

52 worry aboutapplication vulnerabilities

Only 23 have tamper-proofing capabilities

50 are content and data leakage are their top security concern

60 use secure containersfor data security

57 say a lost or stolen device is top concern

60 use passcodesfor device security

5copy 2015 IBM Corporation

MobileFirst

Protect (MaaS360)

AppScan Arxan Trusteer M

bile SDK

IBM Mobile Security Framework

AirWatch MobileIron Good

Citrix Microsoft MocanaHP Fortify Veracode Proguard CA Oracle RSA

bull Manage multi-OS BYOD environment

bull Mitigate risks of lost and compromised devices

bull Separate enterprise and personal data

bull Enforce compliance with security policies

bull Distribute and control enterprise apps

bull Build and secure apps and protect them ldquoin the wildrdquo

bull Provide secure web mobile API access and identify device risk

bull Meet authentication ease-of-use expectation

Extend Security Intelligence

bull Extend security information and event management (SIEM) to mobile platform

bull Incorporate mobile log management anomaly detection configuration and vulnerability management

Manage Access and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 3: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

3copy 2015 IBM Corporation

387new threats

every minute or more than six every second

McAfee

As mobile grows so do security threats

ldquoWith the growing penetration of mobile devices in the enterprise security testing

and protection of mobile applications and data become mandatoryrdquo Gartner

ldquoEnterprise mobilityhellip new systems of engagement

These new systems help firms empower their customers partners

and employees with context-aware apps and smart productsrdquoForrester

Arxan

Top mobile devicesand apps hacked 97

Android

87iOS

4copy 2015 IBM Corporation

What concerns does this create for the enterprise

Source 2014 Information Security Media Group Survey ldquoThe State of Mobile Security Maturityrdquo

32 are concerned about fraudulent transactions

Only 18 can detect malware jailbreaks

52 worry aboutapplication vulnerabilities

Only 23 have tamper-proofing capabilities

50 are content and data leakage are their top security concern

60 use secure containersfor data security

57 say a lost or stolen device is top concern

60 use passcodesfor device security

5copy 2015 IBM Corporation

MobileFirst

Protect (MaaS360)

AppScan Arxan Trusteer M

bile SDK

IBM Mobile Security Framework

AirWatch MobileIron Good

Citrix Microsoft MocanaHP Fortify Veracode Proguard CA Oracle RSA

bull Manage multi-OS BYOD environment

bull Mitigate risks of lost and compromised devices

bull Separate enterprise and personal data

bull Enforce compliance with security policies

bull Distribute and control enterprise apps

bull Build and secure apps and protect them ldquoin the wildrdquo

bull Provide secure web mobile API access and identify device risk

bull Meet authentication ease-of-use expectation

Extend Security Intelligence

bull Extend security information and event management (SIEM) to mobile platform

bull Incorporate mobile log management anomaly detection configuration and vulnerability management

Manage Access and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 4: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

4copy 2015 IBM Corporation

What concerns does this create for the enterprise

Source 2014 Information Security Media Group Survey ldquoThe State of Mobile Security Maturityrdquo

32 are concerned about fraudulent transactions

Only 18 can detect malware jailbreaks

52 worry aboutapplication vulnerabilities

Only 23 have tamper-proofing capabilities

50 are content and data leakage are their top security concern

60 use secure containersfor data security

57 say a lost or stolen device is top concern

60 use passcodesfor device security

5copy 2015 IBM Corporation

MobileFirst

Protect (MaaS360)

AppScan Arxan Trusteer M

bile SDK

IBM Mobile Security Framework

AirWatch MobileIron Good

Citrix Microsoft MocanaHP Fortify Veracode Proguard CA Oracle RSA

bull Manage multi-OS BYOD environment

bull Mitigate risks of lost and compromised devices

bull Separate enterprise and personal data

bull Enforce compliance with security policies

bull Distribute and control enterprise apps

bull Build and secure apps and protect them ldquoin the wildrdquo

bull Provide secure web mobile API access and identify device risk

bull Meet authentication ease-of-use expectation

Extend Security Intelligence

bull Extend security information and event management (SIEM) to mobile platform

bull Incorporate mobile log management anomaly detection configuration and vulnerability management

Manage Access and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 5: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

5copy 2015 IBM Corporation

MobileFirst

Protect (MaaS360)

AppScan Arxan Trusteer M

bile SDK

IBM Mobile Security Framework

AirWatch MobileIron Good

Citrix Microsoft MocanaHP Fortify Veracode Proguard CA Oracle RSA

bull Manage multi-OS BYOD environment

bull Mitigate risks of lost and compromised devices

bull Separate enterprise and personal data

bull Enforce compliance with security policies

bull Distribute and control enterprise apps

bull Build and secure apps and protect them ldquoin the wildrdquo

bull Provide secure web mobile API access and identify device risk

bull Meet authentication ease-of-use expectation

Extend Security Intelligence

bull Extend security information and event management (SIEM) to mobile platform

bull Incorporate mobile log management anomaly detection configuration and vulnerability management

Manage Access and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 6: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

6copy 2015 IBM Corporation

IBM Mobile Security Portfolio

IBM Security Access

Manager

IBMDataPower Gateway

IBMBigFix

IBMMobileFirst

Platform

IBM MobileFirst

ProtectMaaS360

IBMSecurity AppScan

ArxanApplicationProtection

for IBMSolutions

IBM QRadarSecurity

IntelligencePlatform

IBMSecurity Trusteer

IBMMobile

Security Services

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 7: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

7copy 2015 IBM Corporation

Protecting devicesEvery three minutes a mobile device is wiped

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

46say their smartphone

is something they couldnrsquot live without

Source ldquo6 facts about Americans and their smartphonesrdquo

by Pew Research Center April 2015

87By 2017 mobile devices will make up

of Internet-enabled

technology total sales

Source Lander Blog ldquoFive Online Marketing Trends for 2014

April 2014

Source ldquo55 US Mobile Facts Every Marketer Needs For 2015rdquo by Heidi Cohen December 2014

87

have their smartphoneat their sideday and night

78

spend over 2 hoursa day using theirsmartphones

68

consider their smartphone to be a personal device

Millennials and their smartphoneshellip

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 8: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

8copy 2015 IBM Corporation

How do you protect your devices

Identify devices at risk

prepost deployment

Ensure devices accessing

the network are encrypted

Mitigate risks of lost and

compromised devices

Identify and respond

to any device accessing

your corporate data

Deploy and manage a

multi-OS environment with BYOD

Remotely provision

policies and restrictions

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 9: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

9copy 2015 IBM Corporation

Deploy manage and secure devices while mitigating the risks of lost and compromised devices

Rapidly deploy devicesStreamline the device

provisioning configuration

and enrollment process for

enterprise use over the air

Centrally manage devicesEmbrace BYOD corporate

and shared device with

centralized policy and

control from a single console

Proactively secure devicesImplement dynamic policies

and compliance rules to

continuously monitor devices

and take automated action

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 10: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

10copy 2015 IBM Corporation

Large manufacturer deploys successful BYOD programwith IBM MobileFirst Protect

Client securely enabled mobility from the corporate office worker

to the field service representative to better serve customers while

keeping sensitive data secure

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 11: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

11copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Securing content and collaboration

ldquoBreaking Bad The Risk of Unsecure File Sharingrdquo Ponemon Institute October 2014

59 allow employees to share or collaborate on documents

if the company provides the mobile device

6473 Astonishing E-Mail Marketing Statistics You Need to Know Mark the Marketer February 2014

of decision-makers read their

e-mail via mobile devices

60 of employees access content

from outside the officeldquoProductivity Anywhere Anytime Mobilize Your Businessrdquo Box

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 12: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

12copy 2015 IBM Corporation

How do you secure content and collaboration

bull Separate enterprise

and personal data

bull Prevent data leakage

bull Provide secure access

to sensitive data

bull Enforce compliance

with security policies

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 13: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

13copy 2015 IBM Corporation

Separate enterprise and personal data enforcing compliance with security policies

Enable the secure web

Provide access to intranet

sites and web apps URL

filtering and restrict cookies

downloads copy paste

and print features

Separate work email

Contain email text and

attachments to prevent

data leakage enforce

authentication copy paste

and forwarding restrictions

Collaborate on content

Ensure the availability of files

from repositories with

authentication DLP controls

secure edit and sync

and selective wipe

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 14: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

14copy 2015 IBM Corporation

A retail store chain uses IBM MobileFirst Protect for faster service to its customers

Client empowered in-store customer service representatives with

shared smart devices to securely view inventory and merchandise

information while on the store floor

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 15: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

15copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Safeguarding applications and data

22Kaspersky Lab ldquoIT Threat Evolution Report for Q1 of 2015rdquo

billion malicious attacks on

computers and mobile devices

were blocked during Q1 2015

Gartner Press Release May 2014

of all mobile security

breaches are through apps75overall mobile app usage

grew in 201476

Shopping Productivity and Messaging Give Mobile

Another Stunning Growth Yearrdquo Flurry Insights January 2015

On average a company tests less than

half of the mobile apps they build andhellipnever test apps to ensure

they are secure33Ponemon The State of Mobile Application Insecurity February 2015

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 16: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

16copy 2015 IBM Corporation

How can you safeguard applications and data

bull Develop secure mobile apps

and assess the security

of existing apps

bull Secure apps against reverse

engineering and runtime

attacks

bull Prevent deployment

of risky mobile apps

bull Protect app data at rest

and in motion

bull Distribute and control public

and enterprise apps

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 17: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

17copy 2015 IBM Corporation

Build test and secure mobile apps before distributing to end users

Safely distribute apps

Deploy custom enterprise

app catalogs blacklist

whitelist and require

apps administer app

volume purchase

programs

Test app security

Identify vulnerabilities

in development and

pre-deployment

isolate data leakage

risks ensure proper

use of cryptography

Protect apps

Harden mobile apps

to defend against

reverse engineering

prevent repacking

of apps protect apps

from mobile malware

Secure app data

Protect enterprise apps

with authentication

tunneling copy paste

restrictions and prevent

access from

compromised devices

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 18: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

18copy 2015 IBM Corporation

A hospital uses IBM Mobile Security to build a secure and protected patient care app

Doctors nurses and non-hospital employees share timely patient

information and test results on multiple devices to manage care

while protecting sensitive information

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 19: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

19copy 2015 IBM Corporation

Manage access and fraud

ldquoThe CyberVor gang amassed over 45billionrecords

mostly consisting of stolen credentials

To get such an impressive number of credentials

the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

ldquoThe CyberVor gang amassed over 45 billionrecords mostly consisting of stolen credentials To get such an impressive

number of credentials the CyberVors robbed over 420000 web and FTP sitesrdquoHold Security

$653 millionaverage cost of a US data breach2015 Cost of Data Breach Study Ponemon Institute

95 of financial services incidents

involve harvesting credentials

stolen from customer devices2015 Verizon Data Breech Report

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 20: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

20copy 2015 IBM Corporation

How can you manage access and fraud

How do you deliver mobile security

capabilities in a consistent manner

to address

- Web services APIs

- Traditional web access

How do you maintain mobility

authentication ease-of-use

expectations

Can you ensure that security features

are not being sacrificed as the pace

of mobile development and

deployment accelerates

Can you prevent access from high

risk or compromised mobile devices

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 21: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

21copy 2015 IBM Corporation

Prevent unauthorized access and transactions by mobile users

Adaptive access

polices

Dynamic and adaptive

access policies provide risk

and context aware policy

enforcement while maintaining

ease-of-use expectations

Consolidated

enforcement point

A single point of secure

access control and

authentication for APIs

and mobile apps enabling

mobile single-sign-on

Integrated device

risk management

Manage risk from rooted

jailbroken devices and from

mobile malware integrated

into access control polices and

BYOD content management

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 22: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

22copy 2015 IBM Corporation

Company and independent agents access policy information in

corporate offices or field access policies dynamically change based

on risk factors to ensure confidentiality and compliance

An insurance company uses IBM Security Access Managerand Mobile Threat Management to keep customer data safe

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 23: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

23copy 2015 IBM Corporation

Extend Security Intelligence

ManageAccess and Fraud

SafeguardApplications and Data

Secure Content and Collaboration

Protect Devices

Extend security intelligence

Annual Threat Report on Advanced Targeted Attacks Mandiant

Attackers spend an estimated

243 days on a victimrsquos networkbefore being discovered

Annual US cost of a cyber-crime is

$1156 millionper organizationCyber-Crime Costs Continue to Rise Study eWeek

63of victims were made aware

of breaches by an external organizationAnnual Threat Report on Advanced Targeted Attacks Mandiant

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 24: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

24copy 2015 IBM Corporation

How can you extend security intelligence

Increasingly sophisticated mobile attack methods

BYOD resulting in disappearing perimeters

Accelerating mobilesecurity breaches

Infrastructure changing to support mobile

Too many products from multiple vendors costly to configure and manage

Inadequate and ineffective tools

Struggling security teams

Mobile providing additional data sources with limited manpower and skills to manage it all

Managing and monitoring increasing compliance demands

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 25: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

25copy 2015 IBM Corporation

Gaining insights across the entire security event timeline

Prioritize Events

Quickly analyze very large

volumes of collected data

(events and logs) to get to

a manageably small number

of true incidents to be further

analyzed

Identify Threats

Detect configuration errors

and other deviations from

the norm in order to gain

awareness of vulnerabilities

and assess exposures

Take Corrective Action

Dramatically reduce the

time to remediation and

increase the thoroughness

of that remediation

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 26: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

26copy 2015 IBM Corporation

An international energy company parses billions of events per day to find those that should be investigated

An international energy firm analyzes

2 billionevents per day to find 20-25 potential offenses to investigate

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 27: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

27copy 2015 IBM Corporation

Summary

Enterprise mobility management is needed and necessary

MDM is a good place to start but additional security required

Need to account for device risk

Must build secure mobile apps

and must secure apps ldquoin the wildrdquo

Identity and access security must be

adaptive ndash contextually aware

Think of mobile security more holistically

bull Broader than MDM

bull Thinkhellip device content application and access

bull More than a collection of point products

bull Must scale to address enterprise requirements

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 28: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

28copy 2015 IBM Corporation

Learn more about IBM Security

V2015-11-23

countries where IBM delivers managed security services

industry analyst reports rankIBM Security as a LEADER

enterprise security vendor in total revenue

clients protectedincludinghellip

130+

25

No 1

12K+

90 of the Fortune 100 companies

Join IBM X-Force Exchangexforceibmcloudcom

Visit our websiteibmcomsecurity

Watch our videos on YouTubeIBM Security Channel

Read new blog postsSecurityIntelligencecom

Follow us on Twitteribmsecurity

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 29: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

copy Copyright IBM Corporation 2015 All rights reserved The information contained in these materials is provided for informational purposes only and is provided AS IS without warranty of any

kind express or implied IBM shall not be responsible for any damages arising out of the use of or otherwise related to these materials Nothing contained in these materials is intended to nor

shall have the effect of creating any warranties or representations from IBM or its suppliers or licensors or altering the terms and conditions of the applicable license agreement governing the use

of IBM software References in these materials to IBM products programs or services do not imply that they will be available in all countries in which IBM operates Product release dates and or

capabilities referenced in these materials may change at any time at IBMrsquos sole discretion based on market opportunities or other factors and are not intended to be a commitment to future product

or feature availability in any way IBM the IBM logo and other IBM products and services are trademarks of the International Business Machines Corporation in the United States other countries

or both Other company product or service names may be trademarks or service marks of others

Statement of Good Security Practices IT system security involves protecting systems and information through prevention detection and response to improper access from within and outside

your enterprise Improper access can result in information being altered destroyed misappropriated or misused or can result in damage to or misuse of your systems including for use in attacks

on others No IT system or product should be considered completely secure and no single product service or security measure can be completely effective in preventing improper use or access

IBM systems products and services are designed to be part of a lawful comprehensive security approach which will necessarily involve additional operational procedures and may require other

systems products or services to be most effective IBM DOES NOT WARRANT THAT ANY SYSTEMS PRODUCTS OR SERVICES ARE IMMUNE FROM OR WILL MAKE YOUR ENTERPRISE

IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY

THANK YOUwwwibmcomsecurity

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 30: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

Information concerning non-IBM products was obtained from the suppliers of those products their published announcements or other publicly available sources IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance compatibility or any other claims related to non-IBM products Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products IBM does not warrant the quality of any third-party products or the ability of any such third-party products to interoperate with IBMrsquos products IBM EXPRESSLY DISCLAIMS ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

The provision of the information contained herein is not intended to and does not grant any right or license under any IBM patents copyrights trademarks or other intellectual property right

Other company product or service names may be trademarks or service marks of others A current list of IBM trademarks is available at ldquoCopyright and trademark informationrdquo wwwibmcomlegalcopytradeshtml

Copyright copy 2015 by International Business Machines Corporation (IBM) No part of this document may be reproduced or transmitted in any form without written permission from IBM

US Government Users Restricted Rights ndash Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM

Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors IBM shall have no responsibility to update this information THIS document is distributed AS IS without any warranty either express or implied In no event shall IBM be liable for any damage arising from the use of this information including but not limited to loss of data business interruption loss of profit or loss of opportunity

IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided

Any statements regarding IBMrsquos future direction intent or product plans are subject to change or withdrawal without notice Performance data contained herein was generally obtained in a controlled isolated environments Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved Actual performance cost savings or other results in other operating environments may vary References in this document to IBM products programs or services does not imply that IBM intends to make such products programs or services available in all countries in which IBM operates or does business

Workshops sessions and associated materials may have been prepared by independent session speakers and do not necessarily reflect the views of IBM All materials and discussions are provided for informational purposes only and are neither intended to nor shall constitute legal or other guidance or advice to any individual participant or their specific situation

It is the customerrsquos responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customerrsquos business and any actions the customer may need to take to comply with such laws IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law

Legal notices and disclaimers

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 31: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

31copy 2015 IBM Corporation

IBM is the ONLY leader in 8 Mobile related Gartner Magic Quadrants

Enterprise Mobility Management Suites

June 2015

Client ManagementTools

May 2014

Managed Mobility ServicesJuly 2014

Mobile Application Development Platforms

August 2015

ApplicationSecurity Testing

August 2015

Security Informationand Event Management

July 2015

Enterprise Content Management

September 2014

Identity Governance Access

August 2014

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 32: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

32copy 2015 IBM Corporation

Securely manage the diversity of endpointsIBM BigFix and IBM MobileFirst Protect

Any device

Identify and respond to any device accessing your

corporate datamdashregardless of what type it is or

whether itrsquos personal or corporate-owned

Any data

Protect corporate and sensitive apps content and

transactions in a secure container whether in motion

or at rest preventing costly data loss scenarios

Any location

Manage and secure every unique devicemdashwhether itrsquos

on or off your corporate networkmdashanywhere on the

planet

Any time

Get real-time visibility and control of every device on

your network find and fix problems in minutesmdashbefore

they become major disruptions

Consolidated view of managed endpoints

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services

Page 33: IBM Seguridad Móvil - Acompaña tu estrategia BYOD

33copy 2015 IBM Corporation

Leading expertise to help optimize your security program

Deploy

Optimize

Build

Plan

Design

Identify capability gaps plan and deploya robust strategy and roadmap to close them

Gain insight to prioritize security investments

Deploy intelligence-driven security capabilities

Optimize your ability to react to and contain events while reducing impact

SOC TransformationBuild next generation security operations

Security MaturityAssess and transform your security posture

Metrics

Technology

Governance

Process

Organization

IBM Security Strategy Intelligence and Operations Consulting Services


Recommended