SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Mark Skilton, Professor of Practice in Information Systems
Management, Warwick Business School, UK

Warwick Business School
Knowing where the safe zone is - Defining
perimeter access strategies for an enterprise
The modern enterprise today has many connections, relationships and
services. Information technology has enabled communication, social
communities and transactions to create opportunities for new types of
value. But this has also changed the types of risks and security issues as
bring your own device (BYOD) and the many types of cloud services have
shifted responsibilities. Do you know where the access perimeter of your
company security is? How do you define risk and value of new
technology?
What are the opportunities and challenges of new
technologies and on legacy operations?
This presentation will look at ways to define the new business – technology
boundaries and the risk and challenges of managing new technology
across these boundaries.

Warwick Business School
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Business Ecosystem
the challenges we face

Old model
Business and IT use of
software and hardware assets
Project based development
lifecycle
Platforms and networks
Transformational advisory and
governance
Security controls and audit
service monitoring

Why business ecosystems ?

New model:
Data plethora of data types
and sources
Multi-channel Service
marketplaces
Devices and “things”
Focus on intelligent processes
and monetization
Compliance and pervasive
automated monitoring of
security
Objects in the Internet of Things
There are potentially billions of objects that could connect through IP addresses and network protocols to
identify , exchange and collaborate services.

Devices

Tags, Sensors and
platforms

Products
Content
Services
Money

Places
and
Machines
Era of Internetworking - Where is
the perimeter ?
Internet

Switches

Tier 1 Networks

NSPs

Network Peering
and Interconnections

Tier 2 ISP

Tier 2 Network

IP Backbone

IXP

Examples of ISP services include email, FTP, webhosting

ISPs

Internetworking

Satellite
Public Switched
Telephone
Networks

PTSN

Tier 3 networks
(ISP)

Cable
Operators

DSL, T1, T3 Leased Lines

Wide Area
Network WAN

4G (3G LTE/SAE)
Gateways
Gateways

3G / 3.5G

Femtocell

Wifi

Gateways

InfraRed
Local
Area
Network
LAN

GPS

Bluetooth

Mobile Devices

RFID

Sensors

Proximity,
Smart Card
+ 2.5 Billion Internet Users 2013
Representing 35% World
Population

Why business ecosystems ?
1.7 billion mobile devices sold in 2012, and
6.8 billion subscriptions equivalent to 96
percent of the world population

Why business ecosystems ?
Internet video accounting for 61 % of
total internet data (cisco)

Social Media
Is driving
massive online
Video growth

Why business ecosystems ?
1 in 4 people around world use at least one
form social networking = 1.7 Billion in
2013
1 in 3 people = 2.55 billion global audience
by 2017
all the geo-tagged locations of uploaded Flickr photos by concentration.
Why business ecosystems ?
Where is the perimeter ?
No. People
in Organization

Ave No. of social
network
connections

No. Hours
Online
Formal

Yourself

No. of Devices
per person

Why business ecosystems ?

Near to you Your Network

No. of
networks

informal/formal

Your Extended Network

No. applications
and web sites
Visited, used
What is your Organization
estimated perimeter node score ?
Formal

X

Average
No. of Devices
per person

X

3

Average
No. People
in Organization

500

X

No. of
system
networks

X

informal/formal

Ave No. of
social
network
connections

X

X 3 X 300 X

No. applications
/ Web sites
Visited, used

10

13,500,000
Illustrative only
Why business ecosystems ?

X

Average
No. Hours
Online

X 5
67,500,000
What is your personal estimated
perimeter node score ?
Formal

Average
No. of Devices
per person

5

X

No. of
system
networks

Why business ecosystems ?

Ave No. of
social
network
connections

X

No. applications
/ Web sites
Visited, used

X 5 X 2000 X 10

Assume International Travel x5 per year
Assume travel 3 times per week
Assume WIFI, 3G/4G networks
Illustrative only

X

informal/formal

300,000

X

Average
No. Hours
Online

X 10
3,000,000
What is a secure perimeter ?
Controlled access
No. People
in Organization

Compliant

Why business ecosystems ?

Secure
Controlled
system
No. of Devices
networks
per person
Controlled social
network
connections

Configured/standards

Continuous
access and use
state monitoring

?
Managed
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Data is getting more complex

Structured data
Semi-structured data
Unstructured data
Data |
Increasingly
Externalized
And metadata

Your edge profile data
Your message payload
data
Your behavioral metadata
- co-presence
Your transient data –
travel in physical and
virtual space
Embedded Data shelf life
value
(“productization of data”)
Connectivity is changing
Example programmable web have collected a database of Open
APIs. Many companies use APIs to establish connectivity services with their
web sites

Open APIs
And Closed
(Proprietary)
APIs

Managed APIs can be problematic if the API specification is changes by the Provider impacting
on the users of that API. APIs are a common method for many Cloud system service connections.
Enterprise Technology is externalized
“as a service” points Protection Points System Access ports
Web access
Corporate / Private Network

Internet
Network services

Backend services
External Firewall

Devices

Network

Network

Mobile applications
Mobile Data

Internal Firewall
G
A
T
W
A
Y

APIs

Applications

Data

Active Directory
API Management gateway

Identity ?
Access provisioning

Authentication and Data Privacy ?

VPN Tunnel

Usage Policy Governance, compliance, and controls
“AS A SERVICE”
Perimeter definitions – heat mapping
Market segments
and entities

Social Network
Channels

APIs

Own data and IP

Your Enterprise Networks

3rd party data and IP

3rd party Networks

Staff, products,
Services, assets,
facilities
SPAN Of CONTROL
Risk - Impact
* USB Investment research

Federated Devices
Authorization
Management

Certification
Processes and services

“ ID Theft every 79
Seconds (*)

DR and BC
Management
Risk Scorecard
Today
Cloud
Corporate Risk
5 4

Describing risk
Risk
Management 4

5
Corporate
Reward

4
3 2

3

3

2
1
Risk Awareness
5

3

0

4

2
Risk Impact 4
Severity

2
2

4
Risk impact
Probability
Warwick Business School

Degree of
Collaboration

Information
4Security Level
Requirement
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
API Management

Examples Mashery an Intel Company, provide a secure appliance and software
system for managing API connectivity to multiple devices and services
Web GUI to manage
the API policies and use

Appliance is used to Manage
access to APIs
Cloud Aggregator Broker –
Orchestrator
Example : Mulesoft Cloud Hub – enabled integration of multi-cloud integration
Apps
Stores

Where
is the
Perimeter?
Contract
Perimeter
versus
Technical
Perimeter
Example Network Traffic Monitoring for
Virtualized compute environments
Example Net Optics Phantom Virtualization Tap
Monitoring of Inter-VM
traffic across all best-ofbreed hypervizors in
virtual computing
environments.
The Phantom Monitor
component installs in the
hypervizor for total traffic
visibility.
Use with virtual or
physical Intrusion
Detection Systems (IDSs),
protocol analyzers, layer2 and Later-3 probes, and
other devices.
Network Traffic
Monitoring Appliance
Example Intrusion Prevention System (IPS)
Example McAfee Network Security Platform
User Identification

Key Features
Threat Prevention
Botnet detection
Behavior-based analysis
Malware protection
Forensic analysis integrated
Scalable web-based management
Application Identification

Device identification
IP de-fragmentation and TCP stream
reassembly
Anomaly detection
Inspection of virtual environments
DoS and DDoS prevention
File reputation, IP reputation, Geolocation
Protocol tunnelling support , IPv6,
V4-. MPLS
Example Cloud Environment
Application Performance management
Example Compuware APM. Monitors applications across physical and virtual
networks and environments. can be deployed easily into private, public or
hybrid cloud applications via either BYOL (bring your own license) or elastic,
consumption based models.

Application response times
User Experience
Real time and synthetic load testing
Overview
Knowing the safe zone – perimeter strategies

What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Martini model: Any IP, any device,
any time anywhere

Jericho Forum, The Open Group
Cloud “as a services” Security
Solutions
Device Security

Proxy Controls / Appliances

Device
Authentication
Security

Endpoint
Device
Management

Strong
Password
Control

Subscriber account security

API Usage
Port Network
connect
Device Connect

Fillters

Intrusion
Prevention
System (IPS)

Chargebacks
/Billing
Controls

Service
Metering
Controls

Web Store
Front

Cloud Service security Status

Anti virus
Anti Spam

Security
Information

Cloud
Service
Reporting

management
(SIM)

Data Loss
Prevention
(DLP)
Mobile
Device
Management
(MDM)

Single Signon

Wipe data
when Lost

Remote
Application
Control

Token PKI,
SSH Keys
Controls

User Group,
Directory
Management

Application
Virtualization
(Secure VDI)

Network
Monitoring

Network
Transport
Encryption
(VPN)

Hypervizor /
VM
Monitoring

Database
Monitoring

Cryptographic controls
Data
Encryption

External Example
http://wwwclouage.com

Cloud Monitoring

Identity and
Access
Management

Virtualization Isolation services
Cloud
Storage
Virtualization

Internal

Authentication / Authorization

Application
Usage
Monitoring

Service Level
Outage
Monitoring

PaaS Development and XaaS Deployment
Service
Configuration
management

Code
Version
Encryption

Code/VM
Deployment
Encryption
Overview
What is your business ecosystem ?
Describing your security risk and opportunity
Managing opportunities – API management
Managing access - connectivity
The future ?

Overview
Identity is going to get much more broader and personal

The future?
Mental Health
Physiology
Dreaming
Genetics
Activity
Drugs
Drink
Sleep
Diet

The future?
The future?
The future?
The surface underneath
The security layer pervades everywhere
Enterprise operating models will need underpinned of legal
and security strategies to support and validate an increasingly
externalized business model
API Management

Network
management

Intrusion
Management
Application
Management

Identity and access
Management

Encryption
Management

Compliance and IP
Management
Holistic Governance , Risk &
Compliance for ecosystems
Security is critical in moving IT services that are potentially no longer under the enterprise control or on
premise. The following diagram looks at On-premise and Off premise security controls .
Risk
Management

Compliance

Monitoring Management

Audit

Security Governance
Personnel Security
Management

Security Policy
Management

Access Management
Identity
Management

Firewall
Management

Validate

Log, Analyze, Event management

Test
Regime

Business Continuity
Management

Availability Management
Backup
Management

Disaster Recovery
Management

Identify
Translate

Incident Management

Security Operations
Asset
Digital Rights
Management
Management

Administrationn

Privilege, Deploy, Decommission, Dispose

Encryption
Management

Security Controls
Private Network
Management

Portability Management

Secure Development/Operations
Coding Standards

Code review

Unit Test

Publish/
Versions
Conclusions

Knowing where the safe zone is - Defining perimeter access
strategies for an enterprise
Scaling of business technology will drive changes in cultural and
legal issues as data and usage shifts toward social network based
economy
Cloud enabled commodization and “on stop contract/less” but may
alter risk profile complexity
There will be a variant of technologies to manage externalized
Identity and usage access
–
–
–
–

API Management
Social network usage in processes
Data analytics for usage behaviors
A combination of both

Technologies will enable wider Identity profiles challenging legal
boundaries of access and usage
The future?
Knowing where the safe zone is  ovum october 22 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Fjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | AccentureFjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | Accentureaccenture
 
The Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital EconomyThe Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital EconomyCognizant
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...Rick Bouter
 
Platforms, where the digital economy stands up
Platforms, where the digital economy stands upPlatforms, where the digital economy stands up
Platforms, where the digital economy stands upFrancisco J. Jariego, PhD.
 
Implications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOsImplications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOsCapgemini
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Son Phan
 
FinTech 2015 Edinburgh
FinTech 2015 EdinburghFinTech 2015 Edinburgh
FinTech 2015 EdinburghRay Bugg
 
Commentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform EconomyCommentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform EconomyCognizant
 
Di 2021 tech-trends
Di 2021 tech-trendsDi 2021 tech-trends
Di 2021 tech-trendsLearningade
 
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...Cognizant
 
Digital Platform Economy
Digital Platform EconomyDigital Platform Economy
Digital Platform EconomyGrow VC Group
 
Disruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 UpdateDisruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 UpdateCTRM Center
 
Digital Transformation
Digital TransformationDigital Transformation
Digital TransformationEvgeny Tsarkov
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 
Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTVINTlabs | The Sogeti Trendlab
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...default default
 
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...apidays
 
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...Rick Bouter
 

Was ist angesagt? (20)

Fjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | AccentureFjord Trends 2020: Emerging Trends in Business | Accenture
Fjord Trends 2020: Emerging Trends in Business | Accenture
 
The Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital EconomyThe Work Ahead: Mastering the Digital Economy
The Work Ahead: Mastering the Digital Economy
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Telco 2020
Telco 2020Telco 2020
Telco 2020
 
Platforms, where the digital economy stands up
Platforms, where the digital economy stands upPlatforms, where the digital economy stands up
Platforms, where the digital economy stands up
 
Implications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOsImplications of Industry 4.0 for CIOs
Implications of Industry 4.0 for CIOs
 
Defending intellectual property abroad
Defending intellectual property abroadDefending intellectual property abroad
Defending intellectual property abroad
 
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
Internet of things: Accelerate Innovation and Opportunity on top The 3rd Plat...
 
FinTech 2015 Edinburgh
FinTech 2015 EdinburghFinTech 2015 Edinburgh
FinTech 2015 Edinburgh
 
Commentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform EconomyCommentary: Making Dollars & Sense of the Platform Economy
Commentary: Making Dollars & Sense of the Platform Economy
 
Di 2021 tech-trends
Di 2021 tech-trendsDi 2021 tech-trends
Di 2021 tech-trends
 
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
Intelligent Automation: Exploring Enterprise Opportunities for Systems that D...
 
Digital Platform Economy
Digital Platform EconomyDigital Platform Economy
Digital Platform Economy
 
Disruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 UpdateDisruptive Technologies – A 2021 Update
Disruptive Technologies – A 2021 Update
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Design to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINTDesign to Disrupt: New Digital Competition - Sogeti VINT
Design to Disrupt: New Digital Competition - Sogeti VINT
 
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
The Internet of Things: Are Organizations Ready For A Multi-Trillion Dollar P...
 
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
APIdays Paris 2019 - Banking on the Platform Economy - The Next Wave of Disru...
 
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
Connect - Talk - Think - Act: Developing Internet of Things & Industrial Inte...
 

Andere mochten auch

Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4Mark Skilton
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1Mark Skilton
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Mark Skilton
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Mark Skilton
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2Mark Skilton
 
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Mark Skilton
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Mark Skilton
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Mark Skilton
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentAdobe
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...Mark Skilton
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Mark Skilton
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Mark Skilton
 
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación AbiertaEcosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación AbiertaGrial - University of Salamanca
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsJean-François Caenen
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNUS-ISS
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystemsMichael Weiss
 
Ecosystems and Digital Business Models
Ecosystems and Digital Business ModelsEcosystems and Digital Business Models
Ecosystems and Digital Business ModelsSlashData
 
Platform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & ControlPlatform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & ControlMarshall Van Alstyne
 
Platform Strategy and Digital Ecosystems
Platform Strategy and Digital EcosystemsPlatform Strategy and Digital Ecosystems
Platform Strategy and Digital EcosystemsApigee | Google Cloud
 

Andere mochten auch (20)

Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4Capgemini cloud expoeurope jan 25 2012 m skilton  v1.4
Capgemini cloud expoeurope jan 25 2012 m skilton v1.4
 
Visualization of an digital ecosystem capgemini m skilton v1
Visualization of an digital ecosystem    capgemini m skilton v1Visualization of an digital ecosystem    capgemini m skilton v1
Visualization of an digital ecosystem capgemini m skilton v1
 
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
Digital security and the IT Department cw500 M Skilton May 22 2014 London v1
 
Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...Identifying successful business models to drive monetization of your cloud se...
Identifying successful business models to drive monetization of your cloud se...
 
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2Platform 3 kickoff april 4 2013 my thoughts  mark skilton v2
Platform 3 kickoff april 4 2013 my thoughts mark skilton v2
 
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
Building a digital enterprise – some practitoner views M.Skilton may 2015 v2
 
Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1Role of data integration in enabling your digital business march 18 12 noon v1
Role of data integration in enabling your digital business march 18 12 noon v1
 
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
Exploring potential of ng cost of infrastructure m skilton sept 23 2014 v1
 
Solution deck capgemini cloud assessment
Solution deck capgemini cloud assessmentSolution deck capgemini cloud assessment
Solution deck capgemini cloud assessment
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1Big data and digital ecosystem mark skilton jan 2014 v1
Big data and digital ecosystem mark skilton jan 2014 v1
 
Sap cloud ecosystem
Sap cloud ecosystemSap cloud ecosystem
Sap cloud ecosystem
 
Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1Closing the gap in your cloud ecosystem capgemini mark skilton v1
Closing the gap in your cloud ecosystem capgemini mark skilton v1
 
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación AbiertaEcosistemas Tecnológicos: Innovando en la Educación Abierta
Ecosistemas Tecnológicos: Innovando en la Educación Abierta
 
Cloud Computing for Enterprise Architects
Cloud Computing for Enterprise ArchitectsCloud Computing for Enterprise Architects
Cloud Computing for Enterprise Architects
 
New Business Models in the Digital Ecosystem
New Business Models in the Digital EcosystemNew Business Models in the Digital Ecosystem
New Business Models in the Digital Ecosystem
 
Business models and ecosystems
Business models and ecosystemsBusiness models and ecosystems
Business models and ecosystems
 
Ecosystems and Digital Business Models
Ecosystems and Digital Business ModelsEcosystems and Digital Business Models
Ecosystems and Digital Business Models
 
Platform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & ControlPlatform Strategy: Openness, Innovation & Control
Platform Strategy: Openness, Innovation & Control
 
Platform Strategy and Digital Ecosystems
Platform Strategy and Digital EcosystemsPlatform Strategy and Digital Ecosystems
Platform Strategy and Digital Ecosystems
 

Ähnlich wie Knowing where the safe zone is ovum october 22 2013

Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development PlatformUnmesh Ballal
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDForgeRock
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple ITCisco Canada
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Internet of Things Stack
Internet of Things StackInternet of Things Stack
Internet of Things StackPostscapes
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1RaynaITSTEP
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 

Ähnlich wie Knowing where the safe zone is ovum october 22 2013 (20)

Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
Cisco Connect Halifax 2018 Simple IT
Cisco Connect Halifax 2018   Simple ITCisco Connect Halifax 2018   Simple IT
Cisco Connect Halifax 2018 Simple IT
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Information Security
Information SecurityInformation Security
Information Security
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
 
Internet of Things Stack
Internet of Things StackInternet of Things Stack
Internet of Things Stack
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Knowing where the safe zone is ovum october 22 2013

  • 1. Mark Skilton, Professor of Practice in Information Systems Management, Warwick Business School, UK Warwick Business School
  • 2. Knowing where the safe zone is - Defining perimeter access strategies for an enterprise The modern enterprise today has many connections, relationships and services. Information technology has enabled communication, social communities and transactions to create opportunities for new types of value. But this has also changed the types of risks and security issues as bring your own device (BYOD) and the many types of cloud services have shifted responsibilities. Do you know where the access perimeter of your company security is? How do you define risk and value of new technology? What are the opportunities and challenges of new technologies and on legacy operations? This presentation will look at ways to define the new business – technology boundaries and the risk and challenges of managing new technology across these boundaries. Warwick Business School
  • 3. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 4. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 5. Business Ecosystem the challenges we face Old model Business and IT use of software and hardware assets Project based development lifecycle Platforms and networks Transformational advisory and governance Security controls and audit service monitoring Why business ecosystems ? New model: Data plethora of data types and sources Multi-channel Service marketplaces Devices and “things” Focus on intelligent processes and monetization Compliance and pervasive automated monitoring of security
  • 6. Objects in the Internet of Things There are potentially billions of objects that could connect through IP addresses and network protocols to identify , exchange and collaborate services. Devices Tags, Sensors and platforms Products Content Services Money Places and Machines
  • 7. Era of Internetworking - Where is the perimeter ? Internet Switches Tier 1 Networks NSPs Network Peering and Interconnections Tier 2 ISP Tier 2 Network IP Backbone IXP Examples of ISP services include email, FTP, webhosting ISPs Internetworking Satellite Public Switched Telephone Networks PTSN Tier 3 networks (ISP) Cable Operators DSL, T1, T3 Leased Lines Wide Area Network WAN 4G (3G LTE/SAE) Gateways Gateways 3G / 3.5G Femtocell Wifi Gateways InfraRed Local Area Network LAN GPS Bluetooth Mobile Devices RFID Sensors Proximity, Smart Card
  • 8. + 2.5 Billion Internet Users 2013 Representing 35% World Population Why business ecosystems ?
  • 9. 1.7 billion mobile devices sold in 2012, and 6.8 billion subscriptions equivalent to 96 percent of the world population Why business ecosystems ?
  • 10. Internet video accounting for 61 % of total internet data (cisco) Social Media Is driving massive online Video growth Why business ecosystems ?
  • 11. 1 in 4 people around world use at least one form social networking = 1.7 Billion in 2013 1 in 3 people = 2.55 billion global audience by 2017 all the geo-tagged locations of uploaded Flickr photos by concentration. Why business ecosystems ?
  • 12. Where is the perimeter ? No. People in Organization Ave No. of social network connections No. Hours Online Formal Yourself No. of Devices per person Why business ecosystems ? Near to you Your Network No. of networks informal/formal Your Extended Network No. applications and web sites Visited, used
  • 13. What is your Organization estimated perimeter node score ? Formal X Average No. of Devices per person X 3 Average No. People in Organization 500 X No. of system networks X informal/formal Ave No. of social network connections X X 3 X 300 X No. applications / Web sites Visited, used 10 13,500,000 Illustrative only Why business ecosystems ? X Average No. Hours Online X 5 67,500,000
  • 14. What is your personal estimated perimeter node score ? Formal Average No. of Devices per person 5 X No. of system networks Why business ecosystems ? Ave No. of social network connections X No. applications / Web sites Visited, used X 5 X 2000 X 10 Assume International Travel x5 per year Assume travel 3 times per week Assume WIFI, 3G/4G networks Illustrative only X informal/formal 300,000 X Average No. Hours Online X 10 3,000,000
  • 15. What is a secure perimeter ? Controlled access No. People in Organization Compliant Why business ecosystems ? Secure Controlled system No. of Devices networks per person Controlled social network connections Configured/standards Continuous access and use state monitoring ? Managed
  • 16. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 17. Data is getting more complex Structured data Semi-structured data Unstructured data Data | Increasingly Externalized And metadata Your edge profile data Your message payload data Your behavioral metadata - co-presence Your transient data – travel in physical and virtual space Embedded Data shelf life value (“productization of data”)
  • 18. Connectivity is changing Example programmable web have collected a database of Open APIs. Many companies use APIs to establish connectivity services with their web sites Open APIs And Closed (Proprietary) APIs Managed APIs can be problematic if the API specification is changes by the Provider impacting on the users of that API. APIs are a common method for many Cloud system service connections.
  • 19. Enterprise Technology is externalized “as a service” points Protection Points System Access ports Web access Corporate / Private Network Internet Network services Backend services External Firewall Devices Network Network Mobile applications Mobile Data Internal Firewall G A T W A Y APIs Applications Data Active Directory API Management gateway Identity ? Access provisioning Authentication and Data Privacy ? VPN Tunnel Usage Policy Governance, compliance, and controls “AS A SERVICE”
  • 20. Perimeter definitions – heat mapping Market segments and entities Social Network Channels APIs Own data and IP Your Enterprise Networks 3rd party data and IP 3rd party Networks Staff, products, Services, assets, facilities SPAN Of CONTROL
  • 21. Risk - Impact * USB Investment research Federated Devices Authorization Management Certification Processes and services “ ID Theft every 79 Seconds (*) DR and BC Management
  • 22. Risk Scorecard Today Cloud Corporate Risk 5 4 Describing risk Risk Management 4 5 Corporate Reward 4 3 2 3 3 2 1 Risk Awareness 5 3 0 4 2 Risk Impact 4 Severity 2 2 4 Risk impact Probability Warwick Business School Degree of Collaboration Information 4Security Level Requirement
  • 23. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 24. API Management Examples Mashery an Intel Company, provide a secure appliance and software system for managing API connectivity to multiple devices and services Web GUI to manage the API policies and use Appliance is used to Manage access to APIs
  • 25. Cloud Aggregator Broker – Orchestrator Example : Mulesoft Cloud Hub – enabled integration of multi-cloud integration Apps Stores Where is the Perimeter? Contract Perimeter versus Technical Perimeter
  • 26. Example Network Traffic Monitoring for Virtualized compute environments Example Net Optics Phantom Virtualization Tap Monitoring of Inter-VM traffic across all best-ofbreed hypervizors in virtual computing environments. The Phantom Monitor component installs in the hypervizor for total traffic visibility. Use with virtual or physical Intrusion Detection Systems (IDSs), protocol analyzers, layer2 and Later-3 probes, and other devices. Network Traffic Monitoring Appliance
  • 27. Example Intrusion Prevention System (IPS) Example McAfee Network Security Platform User Identification Key Features Threat Prevention Botnet detection Behavior-based analysis Malware protection Forensic analysis integrated Scalable web-based management Application Identification Device identification IP de-fragmentation and TCP stream reassembly Anomaly detection Inspection of virtual environments DoS and DDoS prevention File reputation, IP reputation, Geolocation Protocol tunnelling support , IPv6, V4-. MPLS
  • 28. Example Cloud Environment Application Performance management Example Compuware APM. Monitors applications across physical and virtual networks and environments. can be deployed easily into private, public or hybrid cloud applications via either BYOL (bring your own license) or elastic, consumption based models. Application response times User Experience Real time and synthetic load testing
  • 29. Overview Knowing the safe zone – perimeter strategies What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 30. Martini model: Any IP, any device, any time anywhere Jericho Forum, The Open Group
  • 31. Cloud “as a services” Security Solutions Device Security Proxy Controls / Appliances Device Authentication Security Endpoint Device Management Strong Password Control Subscriber account security API Usage Port Network connect Device Connect Fillters Intrusion Prevention System (IPS) Chargebacks /Billing Controls Service Metering Controls Web Store Front Cloud Service security Status Anti virus Anti Spam Security Information Cloud Service Reporting management (SIM) Data Loss Prevention (DLP) Mobile Device Management (MDM) Single Signon Wipe data when Lost Remote Application Control Token PKI, SSH Keys Controls User Group, Directory Management Application Virtualization (Secure VDI) Network Monitoring Network Transport Encryption (VPN) Hypervizor / VM Monitoring Database Monitoring Cryptographic controls Data Encryption External Example http://wwwclouage.com Cloud Monitoring Identity and Access Management Virtualization Isolation services Cloud Storage Virtualization Internal Authentication / Authorization Application Usage Monitoring Service Level Outage Monitoring PaaS Development and XaaS Deployment Service Configuration management Code Version Encryption Code/VM Deployment Encryption
  • 32. Overview What is your business ecosystem ? Describing your security risk and opportunity Managing opportunities – API management Managing access - connectivity The future ? Overview
  • 33. Identity is going to get much more broader and personal The future?
  • 37. The surface underneath The security layer pervades everywhere Enterprise operating models will need underpinned of legal and security strategies to support and validate an increasingly externalized business model API Management Network management Intrusion Management Application Management Identity and access Management Encryption Management Compliance and IP Management
  • 38. Holistic Governance , Risk & Compliance for ecosystems Security is critical in moving IT services that are potentially no longer under the enterprise control or on premise. The following diagram looks at On-premise and Off premise security controls . Risk Management Compliance Monitoring Management Audit Security Governance Personnel Security Management Security Policy Management Access Management Identity Management Firewall Management Validate Log, Analyze, Event management Test Regime Business Continuity Management Availability Management Backup Management Disaster Recovery Management Identify Translate Incident Management Security Operations Asset Digital Rights Management Management Administrationn Privilege, Deploy, Decommission, Dispose Encryption Management Security Controls Private Network Management Portability Management Secure Development/Operations Coding Standards Code review Unit Test Publish/ Versions
  • 39. Conclusions Knowing where the safe zone is - Defining perimeter access strategies for an enterprise Scaling of business technology will drive changes in cultural and legal issues as data and usage shifts toward social network based economy Cloud enabled commodization and “on stop contract/less” but may alter risk profile complexity There will be a variant of technologies to manage externalized Identity and usage access – – – – API Management Social network usage in processes Data analytics for usage behaviors A combination of both Technologies will enable wider Identity profiles challenging legal boundaries of access and usage The future?