SlideShare ist ein Scribd-Unternehmen logo
1 von 34
SESSION ID:
#RSAC
Michelle Waugh
Security in the App Economy
How to Ride the Wave Without Wiping Out!
SPO1-W02
Vice President, Security Solutions
CA Technologies
Are you rolling out new apps & services to your customers?
Are you using security to improve customer engagement?
Are you leveraging security to enable and drive business?
Have you had a breach in the last year -as far as you know?
#RSAC
Today, Every Company is a Software Company.
Are You?
6
From sneaker company to
data enabled athletic
brand.
From book seller to insight driven
delivery service, cloud servicer and
entertainment hub.
From UK Grocer to global consumer
retailer leveraging data and technology
that reframes the shopper experience.
In 2014, CEOs must focus on leading their organizations to think like and become
more like “tech” companies, because within a few years, digital business capabilities
will dominate every industry. Urgent action is needed because first-mover advantage
is common in digital business, and fast followers must be very fast.
Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
#RSAC
7
#RSAC
Traditional Approach to Security
#RSAC#RSAC
Security in the Open Enterprise
#RSAC
Ripped from the Headlines
#RSAC
Security concerns the top
obstacle in app economy#1
-- CA Technologies with Vanson Bourne
Overall IT spend
devoted to Security
over next 3 years
>25%
Leaders saw revenue
increase for security-
enabled services
(18% of Laggards)
47%
Security priority for
business is improving
mobile experience
#2
Increase in
breaches YoY from
2013 to 2014
78%
#RSAC
Security
#RSAC
Application Economy Requires Identity-centric Security
11
IDENTITY - CENTRIC
SECURITY
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
#RSAC
12
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
13
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
#RSAC
#RSAC
Simplify Anywhere, Anything Access
14
CUSTOMERS, EMPLOYEES, PARTNERS
Mobile
Apps
APIs/Web
Services
Web
Apps
From the
Cloud On-Premise
On
Device
Enable access from
any device
Coordinate security across
Web, mobile, APIs
Improve customer
adoption/experience/
loyalty
What you
need to do
#RSAC
The Application Economy is Driving the Rapid
Adoption of Mobile Applications
15
“By 2020, more than 63% of enterprises
expect their desktops to be replaced by
mobile devices connected to the network via
office wireless LAN”
Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales,
14 May 2014
79%of organizations are using SaaS
Sources: Ponemon Institute.
#RSAC
Enabling your Mobile Workforce is a Journey
Web API
Native AppWeb-App
Existing Web
Applications
New Native
App Projects
Unified
Access
Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
#RSAC
IAM + API Solution Enables Fast, Secure
Mobile Delivery of Enterprise Applications
17
Identity Manager
Cloud Apps
On-Premises Enterprise Apps
CA SSO ( SiteMinder ) / LDAP / IdP
CA Mobile API
Gateway
Paul Pronsati
EVP, Global Business Ops & CIO
BENEFITS
 Common standard
across platforms and
applications
 Improves developer
velocity and time to
value
 Application user and
device level security
OAUTH/API
SAML
SAML
SAML
CA Mobile
API Gateway
CA SSO
{SiteMinder} /
LDAP/ldP
On-Premises
Enterprise Apps
Identity Manager
#RSAC
Lessons in Mobility
18
 Begin with the user experience as the focus. Is login required?
 Review and define your architecture holistically; be prepared to move fast!
 Choose the app type that fits your use case and objective and implement a
solution that combines usability and security (native app SSO + web)
 Leverage your existing SSO implementation to improve the experience
 Engage the business now around what SaaS projects are coming up and
position the enterprise friendly vendors…say “yes” to BYOA
 Start thinking beyond front door access for SaaS
#RSAC
19
What you
need to be
thinking
about
#RSAC
PROTECT DATA WHILE
ENABLING BUSINESS
#RSAC
Security – By the Numbers
RECORDS
BREACHED IN 20141,023,108,267
NUMBER OF
BREACH INCIDENTS1,541 BREACHED RECORDS
INCREASE FROM LAST YEAR78%
Data records were lost or stolen with the following frequency
Every Day
2,803,036
Every Hour
116,793
Every Minute
1,947
Every Second
32
#RSAC
Protect Data While Enabling Business
21
 Device
 Geolocation
 Velocity
 User history
 Fraud patterns
PROTECT MOBILE
APP
STRONGLY
AUTHENTICATE
USERS
CONTROL ACCESS
TO WEB APPS
CONTROL ACCESS
TO APIS
SECURE
PRIVILEGED
IDENTITIES
Enable security from
end-to-end
Protect against insider threats
Defend against
external threats
What you
need to do
#RSAC
Combat Insider Threats and External Attacks
Systems
Data
Administrators
Employees
INSIDERS
CUSTOMERS
Web Apps
Strong,Risk-based
Authentication
Privileged
Identity
SSO with Session
Assurance
EXTERNAL
THREATS
BUSINESS VALUE
 Reduced risk of breach through fine-grained admin controls,
hypervisor security, and shared account management.
 Increase security and customer trust with strong, risk-aware
authentication
 Protect against session hijacking with unique session
assurance
PROOF POINTS
 CA Privileged Identity Manager is the ONLY solution that helps secure
critical systems at the OS kernel level
 CA PIM is protecting the systems at 9 out of the top 16 Fortune 25
companies
 CA Advanced Authentication enabled 64% of surveyed companies
improve their user experience
REQUIRED
CAPABILITIES
PIM
Advanced Authentication
SSO
#RSAC
Lessons in protecting your business
23
 Perimeter security is necessary, but not sufficient. You need to think end-to-
end and defend from the inside-out
 Think about your identities. Do your accounts have the right privileges?
Who certified access? Do you have orphaned accounts?
 Nearly all of the most damaging attacks use a privileged identity – focus
your attention here!
 Don’t think of insider threats as purely malicious employees: they can be
targeted with social engineering or can be careless
 Additional security doesn’t have to make the user experience more difficult.
Risk-awareness is essential - security gets applies only where needed
#RSAC
24
What you
need to be
thinking
about
#RSAC
EXTEND BUSINESS
WITH SECURITY
#RSAC
EXTENDING BUSINESS WITH SECURITY
25
Reduce infrastructure
Drive agility into the
business
Reduce need for
security expertise
What you
need to do
IDENTITY
AS A
SERVICE
#RSAC
26
170
Countries
6,500
Corporate & public
sector customers
3 million+
Direct customers
#RSAC
#RSAC
27
#RSAC
FOCUS ON CORE COMPETENCY
Our advice
Seek security expertise
BT’s approach
• Ensure they have depth and breadth of experience in
delivering service
• Remain engaged with your partner security expert
• Provide in-depth defence and incident response
• Around-the-clock protection from cyber threats
• Understand risks as organisation changes – when new
technologies are introduced, new vulnerabilities
presented
• Provide secure access to all remote and mobile workers
#RSAC
Lessons in Identity & Access as a Service
28
 Enable the business to outsource IT Security to managed services
and focus on your true business
 Become the identity provider for external as well as internal users
 Secure identity and access from end to end – from the device, user,
application, transmission, and though to the data source
#RSAC
29
What you
need to be
thinking
about
SIMPLIFY ANYWHERE,
ANYTHING ACCESS
PROTECT DATA WHILE
ENABLING BUSINESS
EXTEND BUSINESS
WITH SECURITY
#RSAC
#RSAC
Security Spend Must do More than Just Secure
30
Sell the business on business value
PROTECT THE BUSINESS
UNLEASH THE BUSINESS
Secure access
to on-premise
and cloud
applications
Govern user
access across
enterprise
Protect against
insider threats
and external
attacks
Accelerate
the delivery
of secure
apps
Deliver multi-
channel –
from Web to
Mobile to APIs
Enable bring
your own
identity
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
Success is the result of right choices.
Choose your waves wisely.
Unknown surfer, March, 2015
#RSAC
32
This is business,
rewritten by software™
#RSAC
#RSAC
Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks
and logos referenced herein belong to their respective companies.
This document is for your informational purposes only. CA assumes no responsibility
for the accuracy or completeness of the information. To the extent permitted by
applicable law, CA provides this document “as is” without warranty of any kind,
including, without limitation, any implied warranties of merchantability, fitness for a
particular purpose, or non-infringement. In no event will CA be liable for any loss or
damage, direct or indirect, from the use of this document, including, without
limitation, lost profits, business interruption, goodwill or lost data, even if CA is
expressly advised in advance of the possibility of such damages.
Thank You
#RSAC
For More Information
To learn more about Security,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlay
from following “More Info Graphics” slide here;
ensure it links to correct page
Security

Weitere ähnliche Inhalte

Was ist angesagt?

Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019NowSecure
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 

Was ist angesagt? (20)

Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Secure your Business
Secure your BusinessSecure your Business
Secure your Business
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 

Ähnlich wie Security in the App Economy: How to Ride the Wave Without Wiping Out!

_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small BusinessesInstasafe1
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitecturePriyanka Aash
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewAbhishek Sood
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityCA Technologies
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfinsightssuccess2
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesSentronex
 
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting
 
Cyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCRI Advantage
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheNovosco
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)IndusfacePvtLtd
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecuritySPLICE Software
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowShantam Goel
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 

Ähnlich wie Security in the App Economy: How to Ride the Wave Without Wiping Out! (20)

_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses_7 Cybersecurity Tips for Small Businesses
_7 Cybersecurity Tips for Small Businesses
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Mobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App SecurityMobile Payment Security with CA Rapid App Security
Mobile Payment Security with CA Rapid App Security
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial Services
 
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
Leverage IT Consulting: Benefits of hiring Managed Cybersecurity Service Prov...
 
Cyber Security Testing – CRI Advantage
Cyber Security Testing – CRI AdvantageCyber Security Testing – CRI Advantage
Cyber Security Testing – CRI Advantage
 
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
IT solution
IT solutionIT solution
IT solution
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Fix nix Pitch
Fix nix PitchFix nix Pitch
Fix nix Pitch
 
Ciso executive workshop
Ciso executive workshopCiso executive workshop
Ciso executive workshop
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018The 10 most trusted authentication solution providers 2018
The 10 most trusted authentication solution providers 2018
 

Mehr von CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Security in the App Economy: How to Ride the Wave Without Wiping Out!

  • 1. SESSION ID: #RSAC Michelle Waugh Security in the App Economy How to Ride the Wave Without Wiping Out! SPO1-W02 Vice President, Security Solutions CA Technologies
  • 2. Are you rolling out new apps & services to your customers?
  • 3. Are you using security to improve customer engagement?
  • 4. Are you leveraging security to enable and drive business?
  • 5. Have you had a breach in the last year -as far as you know?
  • 6. #RSAC Today, Every Company is a Software Company. Are You? 6 From sneaker company to data enabled athletic brand. From book seller to insight driven delivery service, cloud servicer and entertainment hub. From UK Grocer to global consumer retailer leveraging data and technology that reframes the shopper experience. In 2014, CEOs must focus on leading their organizations to think like and become more like “tech” companies, because within a few years, digital business capabilities will dominate every industry. Urgent action is needed because first-mover advantage is common in digital business, and fast followers must be very fast. Gartner; “CEO Resolutions for 2014—Time to Act on Digital Business”; Mark Raskino; March 5, 2014
  • 8. #RSAC#RSAC Security in the Open Enterprise
  • 10. #RSAC Security concerns the top obstacle in app economy#1 -- CA Technologies with Vanson Bourne Overall IT spend devoted to Security over next 3 years >25% Leaders saw revenue increase for security- enabled services (18% of Laggards) 47% Security priority for business is improving mobile experience #2 Increase in breaches YoY from 2013 to 2014 78% #RSAC Security
  • 11. #RSAC Application Economy Requires Identity-centric Security 11 IDENTITY - CENTRIC SECURITY Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 12. #RSAC 12 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 13. #RSAC 13 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS #RSAC
  • 14. #RSAC Simplify Anywhere, Anything Access 14 CUSTOMERS, EMPLOYEES, PARTNERS Mobile Apps APIs/Web Services Web Apps From the Cloud On-Premise On Device Enable access from any device Coordinate security across Web, mobile, APIs Improve customer adoption/experience/ loyalty What you need to do
  • 15. #RSAC The Application Economy is Driving the Rapid Adoption of Mobile Applications 15 “By 2020, more than 63% of enterprises expect their desktops to be replaced by mobile devices connected to the network via office wireless LAN” Gartner - “Mobile Device Proliferation Is Forcing Network Leaders to Redesign Enterprise LANs”, Bjarne Munch, Christian Canales, 14 May 2014 79%of organizations are using SaaS Sources: Ponemon Institute.
  • 16. #RSAC Enabling your Mobile Workforce is a Journey Web API Native AppWeb-App Existing Web Applications New Native App Projects Unified Access Different security options: Deliver app security controls such as SSO based on when & where customer needs it.
  • 17. #RSAC IAM + API Solution Enables Fast, Secure Mobile Delivery of Enterprise Applications 17 Identity Manager Cloud Apps On-Premises Enterprise Apps CA SSO ( SiteMinder ) / LDAP / IdP CA Mobile API Gateway Paul Pronsati EVP, Global Business Ops & CIO BENEFITS  Common standard across platforms and applications  Improves developer velocity and time to value  Application user and device level security OAUTH/API SAML SAML SAML CA Mobile API Gateway CA SSO {SiteMinder} / LDAP/ldP On-Premises Enterprise Apps Identity Manager
  • 18. #RSAC Lessons in Mobility 18  Begin with the user experience as the focus. Is login required?  Review and define your architecture holistically; be prepared to move fast!  Choose the app type that fits your use case and objective and implement a solution that combines usability and security (native app SSO + web)  Leverage your existing SSO implementation to improve the experience  Engage the business now around what SaaS projects are coming up and position the enterprise friendly vendors…say “yes” to BYOA  Start thinking beyond front door access for SaaS
  • 19. #RSAC 19 What you need to be thinking about #RSAC PROTECT DATA WHILE ENABLING BUSINESS
  • 20. #RSAC Security – By the Numbers RECORDS BREACHED IN 20141,023,108,267 NUMBER OF BREACH INCIDENTS1,541 BREACHED RECORDS INCREASE FROM LAST YEAR78% Data records were lost or stolen with the following frequency Every Day 2,803,036 Every Hour 116,793 Every Minute 1,947 Every Second 32
  • 21. #RSAC Protect Data While Enabling Business 21  Device  Geolocation  Velocity  User history  Fraud patterns PROTECT MOBILE APP STRONGLY AUTHENTICATE USERS CONTROL ACCESS TO WEB APPS CONTROL ACCESS TO APIS SECURE PRIVILEGED IDENTITIES Enable security from end-to-end Protect against insider threats Defend against external threats What you need to do
  • 22. #RSAC Combat Insider Threats and External Attacks Systems Data Administrators Employees INSIDERS CUSTOMERS Web Apps Strong,Risk-based Authentication Privileged Identity SSO with Session Assurance EXTERNAL THREATS BUSINESS VALUE  Reduced risk of breach through fine-grained admin controls, hypervisor security, and shared account management.  Increase security and customer trust with strong, risk-aware authentication  Protect against session hijacking with unique session assurance PROOF POINTS  CA Privileged Identity Manager is the ONLY solution that helps secure critical systems at the OS kernel level  CA PIM is protecting the systems at 9 out of the top 16 Fortune 25 companies  CA Advanced Authentication enabled 64% of surveyed companies improve their user experience REQUIRED CAPABILITIES PIM Advanced Authentication SSO
  • 23. #RSAC Lessons in protecting your business 23  Perimeter security is necessary, but not sufficient. You need to think end-to- end and defend from the inside-out  Think about your identities. Do your accounts have the right privileges? Who certified access? Do you have orphaned accounts?  Nearly all of the most damaging attacks use a privileged identity – focus your attention here!  Don’t think of insider threats as purely malicious employees: they can be targeted with social engineering or can be careless  Additional security doesn’t have to make the user experience more difficult. Risk-awareness is essential - security gets applies only where needed
  • 24. #RSAC 24 What you need to be thinking about #RSAC EXTEND BUSINESS WITH SECURITY
  • 25. #RSAC EXTENDING BUSINESS WITH SECURITY 25 Reduce infrastructure Drive agility into the business Reduce need for security expertise What you need to do IDENTITY AS A SERVICE
  • 26. #RSAC 26 170 Countries 6,500 Corporate & public sector customers 3 million+ Direct customers #RSAC
  • 27. #RSAC 27 #RSAC FOCUS ON CORE COMPETENCY Our advice Seek security expertise BT’s approach • Ensure they have depth and breadth of experience in delivering service • Remain engaged with your partner security expert • Provide in-depth defence and incident response • Around-the-clock protection from cyber threats • Understand risks as organisation changes – when new technologies are introduced, new vulnerabilities presented • Provide secure access to all remote and mobile workers
  • 28. #RSAC Lessons in Identity & Access as a Service 28  Enable the business to outsource IT Security to managed services and focus on your true business  Become the identity provider for external as well as internal users  Secure identity and access from end to end – from the device, user, application, transmission, and though to the data source
  • 29. #RSAC 29 What you need to be thinking about SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS EXTEND BUSINESS WITH SECURITY #RSAC
  • 30. #RSAC Security Spend Must do More than Just Secure 30 Sell the business on business value PROTECT THE BUSINESS UNLEASH THE BUSINESS Secure access to on-premise and cloud applications Govern user access across enterprise Protect against insider threats and external attacks Accelerate the delivery of secure apps Deliver multi- channel – from Web to Mobile to APIs Enable bring your own identity Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 31. Success is the result of right choices. Choose your waves wisely. Unknown surfer, March, 2015
  • 32. #RSAC 32 This is business, rewritten by software™ #RSAC
  • 33. #RSAC Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages. Thank You
  • 34. #RSAC For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page Security