SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
LotusLive Engage
                                        ™


                                Security




IBM LotusLive Engage Security                page 1
Contents

                                         Introduction   3

                         Security-rich Infrastructure   4

                Policy Enforcement Points Provide       5
                              Application Security

                         Human Centered Security        8

                                Future Considerations   9

                                          Conclusion    9




IBM LotusLive Engage Security                               page 2
Introduction

                                                                          LotusLive Engage
                                                                          (https://www.lotuslive.com/)
                                                                          provides essential collaboration
                                                                          services, leveraging IBM’s
                                                                          unique position as a world-
                                                                          renowned security leader and
                                                                          trusted partner.




Security is a competitive differentiator for LotusLive and LotusLive Engage. Engage’s business-ready security is based
on a deep understanding of security and privacy best practices, in both IBM and Lotus. Our security controls provide
privacy and controlled authorization to sensitive information while enabling business operations. Engage protects our
customers’ information through governance, tools, technology, techniques, and personnel, each of which we discuss in
more detail below.


The LotusLive Engage Security approach is based on three pillars:
  • A security-rich infrastructure,
  • Policy enforcement points providing application security, and
  • Human centered security


These three themes structure our direction, as well as the discussion below.




IBM LotusLive Engage Security                                                                                     page 3
Security-rich Infrastructure
Physical Infrastructure                                          All personnel roles across LotusLive and their access
LotusLive Engage is deployed in a hardened data center,          authorizations are recorded in a Separation of Duty matrix.
which provides physical protection to systems and data.          These include system developers, operators, customer
The data center is located in Virginia, USA. It uses a myriad    support personnel, and other stake holders.
of security controls to eliminate or prevent physical access
to our systems. Biometric controls are utilized on all physi-    LotusLive is covered by numerous security assurance
cal access points to ensure that only authorized persons         activities throughout its entire lifecycle. IBM performs
have access. CCTV monitoring and recording provides ad-          quarterly security configuration reviews of all systems and
ditional protection in the event of an issue. Security officers   infrastructure. Periodic vulnerability scanning is performed
are on premises 24 hours a day. In addition, the data center     on the network and servers, and there are regular inde-
utilizes strong fire prevention systems, electrical monitoring    pendent application and infrastructure reviews. Rational
systems, earthquake dampers, and solid construction prac-        AppScan testing checks for common web exposures such
tices to prevent the impact of natural disasters interrupting    as cross site scripting, cross site request forgery, and SQL
our services. Power is fed from multiple points in the public    injection. Manual ethical hacking supplements the exper-
power grid and protected with redundant sources.                 tise in the AppScan tool set, targeting the unique applica-
                                                                 tion and infrastructure configuration in LotusLive.
Systems Infrastructure
Network security is provided by high performance, state-         IBM compliance programs are deployed throughout the
of-the-art firewalls. All client communications are encrypt-      delivery environment. IBM’s approach to compliance is
ed with 128 bit algorithms, through SSL on HTTP calls,           multi-layered, with periodic compliance programs that ad-
and through RC2 in our Sametime Instant Messaging pro-           dress all elements of the service environment. The system
tocol. System backups leverage 128-bit AES encryption.           development lifecycle includes code reviews, code control,
                                                                 and accountability. Programs have been established to en-
Real time Antivirus support services provide on demand scan-     able application and infrastructure reviews at the corporate
ning capabilities for the LotusLive environment. IBM uses a      level. Business process based reviews are conducted
robust commercial AV product which is deployed not only          through the project cycles. IBM compliance programs
on the system servers but within the application to provide      mandate periodic self assessments and production scan-
immediate real time scanning on file storage and sharing.         ning and reporting of compliance posture. Privacy reviews
                                                                 help to ensure customer data protection. IBM’s compre-
People and Processes                                             hensive policies on privacy and client data protection can
IBM Online Collaboration Services has a dedicated secu-          be found at http://www.ibm.com/privacy/us/en/.
rity organization that provides clear security management
activities surrounding the network, infrastructure, applica-     IBM ensures that the data center and operational process-
tions, and supporting services. It is responsible for the        es are consistent with SAS70 Type II controls testing. IBM
delivery of security capabilities as well as the specification    enforces that all third party services providers are SAS70
and design of security architecture and compliance man-          Type II certified. IBM is planning SAS70 Type II certifica-
agement technologies and processes. It defines the secu-          tion of the service delivery environment.
rity development and testing activities in the organization,
and delivers much of the security functionality in LotusLive.


IBM LotusLive Engage Security                                                                                           page 4
Policy Enforcement Points Provide
Application Security
Policy enforcement points in the application, middleware,
and infrastructure allow the business customer to better
secure their collaboration within and across their organiza-
tional boundaries.


LotusLive authentication policy is provided by the widely uti-
lized IBM Tivoli Access Manager software, which provides
single sign-on for registered users to all LotusLive compo-
nents and authenticates those users to each other. Unregis-
tered (and unauthenticated) users may join meetings.

                                                                  Figure 1: Administrative protection of user externally fac-
Application level policies are built on the notion of the busi-
                                                                  ing information
ness organization as an information boundary. Different
controls and policies apply within and across organizational boundaries. A directory of subscribers within a specific
LotusLive registered organization is available to all the members of that organization (but only to them). This allows every
member of the organization to see the names, LotusLive roles, job titles, photos, and email address of every other mem-
ber of their organization.


Controls are available to both the individual and the organization’s administrator to provide security and privacy for
identity and personal information of employees in a business social networking context. Individuals or their administrator
can opt-out of their information being show to users outside of the organization, through the company’s externally facing
company page, or through the LotusLive search feature.




                                                                             Figure 2: User opt out of personal externally
                                                                             facing information.




IBM LotusLive Engage Security                                                                                          page 5
Policy Enforcement Points Provide
Application Security (cont.)
The figure below shows an example of an externally facing company page, and how the users who are included in the
company page are represented. Only the user’s name, picture, and title are shown in the company page if they are in-
cluded there.




  Figure 3: Company page with externally facing user information




IBM LotusLive Engage Security                                                                                   page 6
Policy Enforcement Points Provide
Application Security (cont.)
Email names are treated with particular sensitivity by all LotusLive components, because of their use in contacting and
identifying users, and their attractiveness to attackers such as spammers and phishers. A user’s email name is only shown
to others in the organization through the organization’s directory, and to external others only after the user explicitly agrees
to “connect” with them. A registered user’s email address is their confirmed and verified personal identifier. To complete
their LotusLive registration, users prove they control their registered email address by following a URL with a randomly
generated nonce sent to that address.


Application level access controls are available on the collaboration data in every Engage component. These controls
provide the organization as a fundamental unit of sharing, while also allowing users to share at the individual, group, and/
or public level. Public access is restricted to LotusLive registered users, each of which has proven they control access to
their registered email address. In the figure below, an additional author is being added to the shared file.




             Figure 4: Adding a user who can update a shared file.




IBM LotusLive Engage Security                                                                                            page 7
Human Centered Security
The third pillar of LotusLive Engage’s security strategy
recognizes that end users make the day to day decisions
on what to share and what to protect, based on their best
understanding of their responsibilities to their company.
Security that is confusing or not understandable by the
average user offers little benefit. Security that places
unrealistic requirements on user actions will not offer ap-
propriate protection. Engage provides useful and usable
security within the context of business collaboration with
colleagues, partners, and customers. For example, there is
a single view of a file that provides all sharing and upload
information, giving the user full information on the security
of that file in the context of file use. It shows who a file has
been shared with, who has downloaded which version,
and what comments have been made on a file. The view
also allows actions on the file including changing the shar-
ing and control state, and changing the file itself.             Figure 5: Security, sharing, and history context of a file




                                                                             Transparent feedback and safe defaults within
                                                                             LotusLive ensure user security awareness
                                                                             without intrusiveness. For example, a newly
                                                                             uploaded file is private by default, reducing
                                                                             the potential for mistakenly sharing work in
                                                                             its early stages. In the figure below, the radio
                                                                             button “No One” is always the default during
                                                                             a new file upload. The user sees this default
                                                                             when creating new content, and may change
                                                                             it at any time. In the figure below, the user
                                                                             is choosing to share the newly uploaded file
                                                                             with their organization instead of keeping it
                                                                             private.

Figure 6: Sharing a file with your company




IBM LotusLive Engage Security                                                                                          page 8
Future Considerations
A number of security related features are under active consideration for near
term updates to LotusLive Engage.
                                                                                     ...Extended compliance
Some organizations may wish to directly authenticate their members to Lo-
tusLive, controlling all aspects of the authentication credentials of their users.
                                                                                      and oversight features
Tivoli Federated Identity Manager (TFIM) provides support for service provid-
                                                                                         are also a topic for
ers such as LotusLive to accept identity assertions from such organizations,
using standards based protocols such as SAML and OpenID. Identity integra-             future considerations.
tion with partners will also require similar identity synchronization features.
Partner integration will also require authorization controls to enable specific        Support for customer-
applications access to user data at the organizational granularity. OAuth may
                                                                                     controlled encryption of
provide those controls.
                                                                                      files and other content
Extended compliance and oversight features are also a topic for future con-
siderations. Support for customer-controlled encryption of files and other             is a topic of discussion
content is a topic of discussion with the LotusLive partner ecosystem. Ex-
                                                                                         with the LotusLive
tended reporting features may include dashboard views that show the flow of
information across organizational boundaries, and integration of the extensive          partner ecosystem.
compliance reporting facilities available from Tivoli Compliance InSight Man-
ager (TCIM).


The information on new features or any forward-looking statements in this document is intended to outline our general
product direction and should not be relied on in making a purchasing decision. The information on new features to this
service is for informational purposes only and may not be incorporated into any contract. The information is also not a
commitment, promise, or legal obligation to deliver any material, code or functionality. The development, release, and
timing of any features or functionality described for our products remains at our sole discretion.




Conclusion
LotusLive Engage allows users to exchange information and meet online to collaborate without security concerns. Its
security approach is based on a security-rich infrastructure, policy enforcement points providing application security,
and human centered security. LotusLive Engage draws on security competency centers across IBM, including Software
Group, Services, and Research. Our innovation and leadership on cloud collaboration security will continue as we ex-
pand on and improve our services.




IBM LotusLive Engage Security                                                                                       page 9
© Copyright IBM Corporation 2009
References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM oper-
ates. The information is provided “as is” without warranty of any kind, express or implied and is based on IBM’s current product plans and strategy,
which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this
information. Nothing contained herein is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers
or licensors), or altering the terms and conditions of the applicable agreement governing the use of IBM products or services.

IBM, the IBM logo, Lotus, and LotusLive are trademarks of International Business Machines Corporation in the United States, other countries, or both.
Other company, product and service names may be trademarks or service marks of others.



IBM LotusLive Engage Security                                                                                                                  page 10
                                                                                                                                         LOW14011USEN-00

Weitere ähnliche Inhalte

Was ist angesagt?

OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)dyanger
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
Emergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksEmergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksIBM Security
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device J
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
IBM Saves UD $5million annually with software license management initiative
IBM Saves UD $5million annually with software license management initiativeIBM Saves UD $5million annually with software license management initiative
IBM Saves UD $5million annually with software license management initiativeIBM_BSM
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthroughsiddarthc
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Thomas Godsted Rysgaard
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Briefwdjohnson1
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Nordic Infrastructure Conference
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution DatasheetMicrosoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution DatasheetMicrosoft Private Cloud
 

Was ist angesagt? (18)

OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
Emergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security RisksEmergency Response How to Identify and Resolve Security Risks
Emergency Response How to Identify and Resolve Security Risks
 
Byod+ +bring+your+own+device
Byod+ +bring+your+own+device Byod+ +bring+your+own+device
Byod+ +bring+your+own+device
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
IBM Saves UD $5million annually with software license management initiative
IBM Saves UD $5million annually with software license management initiativeIBM Saves UD $5million annually with software license management initiative
IBM Saves UD $5million annually with software license management initiative
 
Seclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet WalkthroughSeclore FileSecure IBM Filenet Walkthrough
Seclore FileSecure IBM Filenet Walkthrough
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....Microsoft Enterprise Mobility Suite | Getting started....
Microsoft Enterprise Mobility Suite | Getting started....
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
Wally Mead - Deploying a system center 2012 r2 configuration manager environm...
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Microsoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution DatasheetMicrosoft Forefront - Secure Messaging Solution Datasheet
Microsoft Forefront - Secure Messaging Solution Datasheet
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 

Andere mochten auch

CDS Hikvision Intro 2012 V.1
CDS  Hikvision Intro 2012 V.1CDS  Hikvision Intro 2012 V.1
CDS Hikvision Intro 2012 V.1mos81
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017InvestorSymantec
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017InvestorSymantec
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 

Andere mochten auch (9)

customer_mag_q3_2012_lr
customer_mag_q3_2012_lrcustomer_mag_q3_2012_lr
customer_mag_q3_2012_lr
 
CDS Hikvision Intro 2012 V.1
CDS  Hikvision Intro 2012 V.1CDS  Hikvision Intro 2012 V.1
CDS Hikvision Intro 2012 V.1
 
Maritime Security and Security Responsibilities
Maritime Security and Security ResponsibilitiesMaritime Security and Security Responsibilities
Maritime Security and Security Responsibilities
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 

Ähnlich wie LotusLive Engage Security whitepaper: Why is security a competitive differentiator for LotusLive and LotusLive Engage?

Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Sumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefSumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefManish Kalra
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
BMC IT Service Management- The Cloudaction.pptx
BMC IT Service Management- The Cloudaction.pptxBMC IT Service Management- The Cloudaction.pptx
BMC IT Service Management- The Cloudaction.pptxCloudaction
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentIBM Security
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Banking at Ho Chi Minh city
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
PR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALPR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALRic Weeks
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionIBM Security
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overviewtibbr
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementDarryl Miles
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 

Ähnlich wie LotusLive Engage Security whitepaper: Why is security a competitive differentiator for LotusLive and LotusLive Engage? (20)

Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Sumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefSumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions Brief
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate Profile
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
BMC IT Service Management- The Cloudaction.pptx
BMC IT Service Management- The Cloudaction.pptxBMC IT Service Management- The Cloudaction.pptx
BMC IT Service Management- The Cloudaction.pptx
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
Ibm tivoli access manager for enterprise single sign on v8.0 migration guide ...
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
PR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALPR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINAL
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
Soa security2
Soa security2Soa security2
Soa security2
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 

Kürzlich hochgeladen

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

LotusLive Engage Security whitepaper: Why is security a competitive differentiator for LotusLive and LotusLive Engage?

  • 1. LotusLive Engage ™ Security IBM LotusLive Engage Security page 1
  • 2. Contents Introduction 3 Security-rich Infrastructure 4 Policy Enforcement Points Provide 5 Application Security Human Centered Security 8 Future Considerations 9 Conclusion 9 IBM LotusLive Engage Security page 2
  • 3. Introduction LotusLive Engage (https://www.lotuslive.com/) provides essential collaboration services, leveraging IBM’s unique position as a world- renowned security leader and trusted partner. Security is a competitive differentiator for LotusLive and LotusLive Engage. Engage’s business-ready security is based on a deep understanding of security and privacy best practices, in both IBM and Lotus. Our security controls provide privacy and controlled authorization to sensitive information while enabling business operations. Engage protects our customers’ information through governance, tools, technology, techniques, and personnel, each of which we discuss in more detail below. The LotusLive Engage Security approach is based on three pillars: • A security-rich infrastructure, • Policy enforcement points providing application security, and • Human centered security These three themes structure our direction, as well as the discussion below. IBM LotusLive Engage Security page 3
  • 4. Security-rich Infrastructure Physical Infrastructure All personnel roles across LotusLive and their access LotusLive Engage is deployed in a hardened data center, authorizations are recorded in a Separation of Duty matrix. which provides physical protection to systems and data. These include system developers, operators, customer The data center is located in Virginia, USA. It uses a myriad support personnel, and other stake holders. of security controls to eliminate or prevent physical access to our systems. Biometric controls are utilized on all physi- LotusLive is covered by numerous security assurance cal access points to ensure that only authorized persons activities throughout its entire lifecycle. IBM performs have access. CCTV monitoring and recording provides ad- quarterly security configuration reviews of all systems and ditional protection in the event of an issue. Security officers infrastructure. Periodic vulnerability scanning is performed are on premises 24 hours a day. In addition, the data center on the network and servers, and there are regular inde- utilizes strong fire prevention systems, electrical monitoring pendent application and infrastructure reviews. Rational systems, earthquake dampers, and solid construction prac- AppScan testing checks for common web exposures such tices to prevent the impact of natural disasters interrupting as cross site scripting, cross site request forgery, and SQL our services. Power is fed from multiple points in the public injection. Manual ethical hacking supplements the exper- power grid and protected with redundant sources. tise in the AppScan tool set, targeting the unique applica- tion and infrastructure configuration in LotusLive. Systems Infrastructure Network security is provided by high performance, state- IBM compliance programs are deployed throughout the of-the-art firewalls. All client communications are encrypt- delivery environment. IBM’s approach to compliance is ed with 128 bit algorithms, through SSL on HTTP calls, multi-layered, with periodic compliance programs that ad- and through RC2 in our Sametime Instant Messaging pro- dress all elements of the service environment. The system tocol. System backups leverage 128-bit AES encryption. development lifecycle includes code reviews, code control, and accountability. Programs have been established to en- Real time Antivirus support services provide on demand scan- able application and infrastructure reviews at the corporate ning capabilities for the LotusLive environment. IBM uses a level. Business process based reviews are conducted robust commercial AV product which is deployed not only through the project cycles. IBM compliance programs on the system servers but within the application to provide mandate periodic self assessments and production scan- immediate real time scanning on file storage and sharing. ning and reporting of compliance posture. Privacy reviews help to ensure customer data protection. IBM’s compre- People and Processes hensive policies on privacy and client data protection can IBM Online Collaboration Services has a dedicated secu- be found at http://www.ibm.com/privacy/us/en/. rity organization that provides clear security management activities surrounding the network, infrastructure, applica- IBM ensures that the data center and operational process- tions, and supporting services. It is responsible for the es are consistent with SAS70 Type II controls testing. IBM delivery of security capabilities as well as the specification enforces that all third party services providers are SAS70 and design of security architecture and compliance man- Type II certified. IBM is planning SAS70 Type II certifica- agement technologies and processes. It defines the secu- tion of the service delivery environment. rity development and testing activities in the organization, and delivers much of the security functionality in LotusLive. IBM LotusLive Engage Security page 4
  • 5. Policy Enforcement Points Provide Application Security Policy enforcement points in the application, middleware, and infrastructure allow the business customer to better secure their collaboration within and across their organiza- tional boundaries. LotusLive authentication policy is provided by the widely uti- lized IBM Tivoli Access Manager software, which provides single sign-on for registered users to all LotusLive compo- nents and authenticates those users to each other. Unregis- tered (and unauthenticated) users may join meetings. Figure 1: Administrative protection of user externally fac- Application level policies are built on the notion of the busi- ing information ness organization as an information boundary. Different controls and policies apply within and across organizational boundaries. A directory of subscribers within a specific LotusLive registered organization is available to all the members of that organization (but only to them). This allows every member of the organization to see the names, LotusLive roles, job titles, photos, and email address of every other mem- ber of their organization. Controls are available to both the individual and the organization’s administrator to provide security and privacy for identity and personal information of employees in a business social networking context. Individuals or their administrator can opt-out of their information being show to users outside of the organization, through the company’s externally facing company page, or through the LotusLive search feature. Figure 2: User opt out of personal externally facing information. IBM LotusLive Engage Security page 5
  • 6. Policy Enforcement Points Provide Application Security (cont.) The figure below shows an example of an externally facing company page, and how the users who are included in the company page are represented. Only the user’s name, picture, and title are shown in the company page if they are in- cluded there. Figure 3: Company page with externally facing user information IBM LotusLive Engage Security page 6
  • 7. Policy Enforcement Points Provide Application Security (cont.) Email names are treated with particular sensitivity by all LotusLive components, because of their use in contacting and identifying users, and their attractiveness to attackers such as spammers and phishers. A user’s email name is only shown to others in the organization through the organization’s directory, and to external others only after the user explicitly agrees to “connect” with them. A registered user’s email address is their confirmed and verified personal identifier. To complete their LotusLive registration, users prove they control their registered email address by following a URL with a randomly generated nonce sent to that address. Application level access controls are available on the collaboration data in every Engage component. These controls provide the organization as a fundamental unit of sharing, while also allowing users to share at the individual, group, and/ or public level. Public access is restricted to LotusLive registered users, each of which has proven they control access to their registered email address. In the figure below, an additional author is being added to the shared file. Figure 4: Adding a user who can update a shared file. IBM LotusLive Engage Security page 7
  • 8. Human Centered Security The third pillar of LotusLive Engage’s security strategy recognizes that end users make the day to day decisions on what to share and what to protect, based on their best understanding of their responsibilities to their company. Security that is confusing or not understandable by the average user offers little benefit. Security that places unrealistic requirements on user actions will not offer ap- propriate protection. Engage provides useful and usable security within the context of business collaboration with colleagues, partners, and customers. For example, there is a single view of a file that provides all sharing and upload information, giving the user full information on the security of that file in the context of file use. It shows who a file has been shared with, who has downloaded which version, and what comments have been made on a file. The view also allows actions on the file including changing the shar- ing and control state, and changing the file itself. Figure 5: Security, sharing, and history context of a file Transparent feedback and safe defaults within LotusLive ensure user security awareness without intrusiveness. For example, a newly uploaded file is private by default, reducing the potential for mistakenly sharing work in its early stages. In the figure below, the radio button “No One” is always the default during a new file upload. The user sees this default when creating new content, and may change it at any time. In the figure below, the user is choosing to share the newly uploaded file with their organization instead of keeping it private. Figure 6: Sharing a file with your company IBM LotusLive Engage Security page 8
  • 9. Future Considerations A number of security related features are under active consideration for near term updates to LotusLive Engage. ...Extended compliance Some organizations may wish to directly authenticate their members to Lo- tusLive, controlling all aspects of the authentication credentials of their users. and oversight features Tivoli Federated Identity Manager (TFIM) provides support for service provid- are also a topic for ers such as LotusLive to accept identity assertions from such organizations, using standards based protocols such as SAML and OpenID. Identity integra- future considerations. tion with partners will also require similar identity synchronization features. Partner integration will also require authorization controls to enable specific Support for customer- applications access to user data at the organizational granularity. OAuth may controlled encryption of provide those controls. files and other content Extended compliance and oversight features are also a topic for future con- siderations. Support for customer-controlled encryption of files and other is a topic of discussion content is a topic of discussion with the LotusLive partner ecosystem. Ex- with the LotusLive tended reporting features may include dashboard views that show the flow of information across organizational boundaries, and integration of the extensive partner ecosystem. compliance reporting facilities available from Tivoli Compliance InSight Man- ager (TCIM). The information on new features or any forward-looking statements in this document is intended to outline our general product direction and should not be relied on in making a purchasing decision. The information on new features to this service is for informational purposes only and may not be incorporated into any contract. The information is also not a commitment, promise, or legal obligation to deliver any material, code or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion. Conclusion LotusLive Engage allows users to exchange information and meet online to collaborate without security concerns. Its security approach is based on a security-rich infrastructure, policy enforcement points providing application security, and human centered security. LotusLive Engage draws on security competency centers across IBM, including Software Group, Services, and Research. Our innovation and leadership on cloud collaboration security will continue as we ex- pand on and improve our services. IBM LotusLive Engage Security page 9
  • 10. © Copyright IBM Corporation 2009 References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM oper- ates. The information is provided “as is” without warranty of any kind, express or implied and is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this information. Nothing contained herein is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable agreement governing the use of IBM products or services. IBM, the IBM logo, Lotus, and LotusLive are trademarks of International Business Machines Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. IBM LotusLive Engage Security page 10 LOW14011USEN-00