SlideShare ist ein Scribd-Unternehmen logo
1 von 26
La Seguridad en la Economía de las
Aplicaciones
Mayo 2015
Denyson Machado
Sr Director Sales Security - LATAM
2 © 2015 CA. ALL RIGHTS RESERVED.
1http://www.gartner.com/newsroom/id/2654115
2http://www.gartner.com/newsroom/id/2352816
3Gartner predicts, 2013 - Application Development
“Software is eating the world”
- Marc Andreeson
A perfect technology storm of mobile apps,
connected products, social connections, data
analytics, and cloud computing continually raises
customer expectations for quality in every industry.3
$131B
worldwide spending
on public cloud
service2
50%
of B2B collaboration
will take place
through APIs by 20163
268B
projected number of
mobile app downloads
by 20171
APPLICATION
ECONOMY
Welcome to the
3 © 2015 CA. ALL RIGHTS RESERVED.
Application Quality and User Experience are Critical
Increasing Customer Expectations & Impact
Sources: *Aberdeen Group, Reaching the Top of the Web Performance Mountain, March 2013
Digital Trends, Are you a rarity? Only 16 percent of people will try out an app more than twice, March 2013
RT.com, NASDAQ longest downtime adds to woes over glitches in electronic trading, Aug 2013
of users will abandon a web
application after just three
seconds of delay*
80-90%
of all consumer
applications will only
be used ONCE
cost of trading
losses during
Facebook IPO due
to ‘system
problems’
25%
$500M
4 © 2015 CA. ALL RIGHTS RESERVED.
Your Apps are Something You are
Not just Something You do…
5 © 2015 CA. ALL RIGHTS RESERVED.
Digitally Connected Banking
Huge Opportunities
2015
Brazilian bank
innovates with first
banking app for Ford
Applink
mobile banking
users by 2019 **
Sources: * McKinsey & Company, August 2014, “The future of US retail-banking distribution”
** Juniper Research, July 2014, Press Release
of customers interact
with their banks
through multiple
channels *
1.75B
65%
6 © 2015 CA. ALL RIGHTS RESERVED.
Understanding Your Market & Consumers
Challenge to Meet Expectations
Source: Accenture, 2014 North America Consumer Digital Banking Survey, “The Digital Disruption in Banking”
27%
Would consider a
branchless digital
bank
71%
Consider their banking
relationship to be
transactional rather
than relationship
driven
51%
Want their bank to
proactively
recommend products
and services for their
financial needs
48%
Are interested in real-
time and forward-
looking spending
analysis
7 © 2015 CA. ALL RIGHTS RESERVED.
Understanding “New Competitors”…
Source: Accenture, 2014 North America Consumer Digital Banking Survey, “The Digital Disruption in Banking”
Q: If these companies offered banking services how likely would you be to bank with them?
Percent of customers which would likely bank with each non-bank with which they do business.
14%
15%
16%
17%
17%
17%
17%
18%
19%
20%
20%
21%
21%
21%
23%
26%
26%
26%
29%
29%
29%
31%
41%
50%
Shoppers Drug Mart (Canadian only)
CVS (US only)
Bell Mobility (Canadian only)
Wallgreens (US only)
Target
UPS
Rogers Wireless (Canadian only)
Verizon Wireless (US only)
eBay
FedEx
United States Postal Service (US only)
Yahoo
Telus Mobility (Canadian only)
Canadia Post (Canadian only)
Walmart
Sprint (US only)
AT&T Mobility (US only)
Amazon
Google
Apple
Costco
T-Mobile (US only)
PayPal
Square
8 © 2015 CA. ALL RIGHTS RESERVED.
3 Themes?
TO MEET
THESE
CHALLENGES,
BANKS
SHOULD
ADVANCE ON
THREE
FRONTS:
1
Become truly omnichannel by seamlessly
integrating the customer experience
across in-branch, assisted, and digital
interactions
2 Extend the ecosystem by offering a
greater range of services for their
customer
3
Offer digital personalized financial advice
and counseling to their customer to help
them better manage their financial needs
BE SECURE
9 © 2015 CA. ALL RIGHTS RESERVED.
Security concerns the top
obstacle in app economy#1
-- CA Technologies with Vanson Bourne
Increase in
Breaches YoY from
2013 to 2014
78%
Leaders saw revenue
increase for security-
enabled services
(18% of Laggards)
47%
Security priority for
business is
improving mobile
experience
#2
Overall IT spend
devoted to Security
over next 3 years
>25%
Security
Security Enables & Protects the business in the App Economy
PROTECT THE BUSINESS
Secure access to on-premise and
cloud applications
Govern user access
across enterprise
Protect against insider threats
and external attacks
ENABLE THE BUSINESS
Accelerate the delivery of
secure applications
Deliver services across customer
channels
– from Web to Mobile to APIs
Provide consumers an Amazing
user experience
OPEN ENTERPRISE
11 © 2015 CA. ALL RIGHTS RESERVED.
Developer
Communities
Partners/Divisions
Customers
Employees / Contractors
Mobile / IoT
Cloud Services
On Premise
Desktop / Web
IDENTITY IS HOW YOU
PROTECT ACCESS
TO DATA & APPLICATION
APIS ARE
HOW YOU CONNECT
DATA & APPLICATIONS
12 © 2015 CA. ALL RIGHTS RESERVED.
In the App Economy the Identity is the New Perimeter
Customers
Citizens
Employees / Partners
Connected Apps / Devices
Cloud Services
On Premise Apps
And Secured APIs will Enable the Digital Success
APIs
IOT DEVICES
CLOUD
MOBILE
PARTNERS/EXTERNAL
DIVISIONS
EXTERNAL
DEVELOPERS
Data
Data
Your New
Digital
Business
14 © 2015 CA. ALL RIGHTS RESERVED.
Security in the App
Economy
15 © 2015 CA. ALL RIGHTS RESERVED.
--on average, a new type of malware was discovered
every 3.75 seconds! In 2014 as a whole, just under six
million new malware strains were seen in the wild, some
77% more than 2013's total.
-- more than double the number of distributed denial of
service attacks in the first quarter of 2015 compared to first
quarter 2014.
-- with a potentially dangerous trend in the 2015 attacks,
with peak DDoS attacks of 100 Gbps making up a
significantly bigger part of the total.
--malware developers are mainly targeting the ubiquitous
Microsoft platforms, with malware programmed as .NET
applications continuing to rise. Overall, new variants for
Windows platforms made up 99.9 percent of the new
malware variants.
16 © 2015 CA. ALL RIGHTS RESERVED.
Increasingly public
breaches will cause shift
from IDM to Identity
Access Security (IAS)
PREDICTION #1
Recent breaches (Target, SONY, Lowe’s)
have IT executives running scared. As
the financial & reputational damage of
a breach increases, they will be
increasing their security budgets to
increase their controls over systems,
data, and insider actions.
70%
of Companies Report a
Security Breach in Last
12 Months
Source: Ponemon Institute Source: Ponemon Institute
Security budgets
will increase
in the next 3 years
39%
REPORT: Cybercrime costs US $12.7M a year
The cost of attacks on large companies is up by 10 percent
Average company now
compromised every four
days, with no end to the
cybercrime wave in sight
Summary: Phishing, denial-
of-service and virus attacks
are now a standard part of
doing business for most
organizations.
17
© 2014 CA. All rights reserved. CA confidential and proprietary information; for internal use only.
No unauthorized use, copying or distribution.
Multi-Factor
Risk Based
Identity
Management
EmployeesCustomers
Partners
Access Controls
Privileged Access
Privileged Identity
Management
Black Hats
Web Access
Management
Federation
Cloud Services
DCs
APIs
18 © 2015 CA. ALL RIGHTS RESERVED.
The rise of the Application
Economy will drive the need for
an “identity dial-tone” to span all
apps, helping to accelerate new
app deployment
PREDICTION #2
There will be an Increased need for
universal access to identity information
across the enterprise. Apps of all kinds
will need easy access to identity &
entitlement info, and it will increasing
be available thru identity system APIs.
A common “identity dial-tone” will
help simplify app development, and
spur new innovative initiatives
Identity “dial-tone”
Employees Customers Partners
Cloud Apps Mobile Apps On-Prem Apps
19 © 2015 CA. ALL RIGHTS RESERVED.
Universal
authentication comes
to your pocket or purse
PREDICTION #3
There will be increased focus on authentication,
driven by factors such as Obama’s executive order
(for multi-factor authentication), chip and pin
technology, etc. Many authentication trends will
begin to converge – biometrics, geolocation,
context, etc. Organizations will strive for “zero-
touch authentication” to deliver as near a
password-free an experience for their customers
and employees as possible. Increasingly, the
phone will be used as a universal authenticator.
Device as universal
authenticator
Passwords
Conduct a
transaction
Control a
connected device
(eg open a door)
Connect
to an app
20 © 2015 CA. ALL RIGHTS RESERVED.
• 10-15% market
• “Walled garden”
• iOS 8
• ~77% adoption
• 80-85% market
• Open source
• Lollipop, but let’s
look at Kit Kat…
• ~40% adoption
21 © 2015 CA. ALL RIGHTS RESERVED.
22 © 2015 CA. ALL RIGHTS RESERVED.
IoT: Toilet Attack?
• Luxury toilet that can be
controlled via Android app
• Connection to the any toilet
is done via the Bluetooth of
the device
23 © 2015 CA. ALL RIGHTS RESERVED.
Mobility & IoT drives
the emergence of API-
first architectures
PREDICTION #4
Apps (esp mobile apps) need to have
reduced delivery times. But, traditional
middleware is heavy and difficult to use
to build these apps on. The rise of mobile
and IoT will drive a move towards lighter-
weight, API-first architectures in order to
more easily connect these (and other
devices) into the digital ecosystem.
APIs
LIGHTER-WEIGHT,
API-BASED ARCHITECTURES
Developers
Customers
Employees
Cloud
Services
On-Premise
Web Mobile loT
IDENTITIES DEVICE TYPES APP TYPES
Today there are 1.5 connected devices per person in the world.
By 2020, there will be 8 devices per person
Biztech Magazine
24 © 2015 CA. ALL RIGHTS RESERVED.
Increased board
visibility into corporate
security strategy
PREDICTION #5
Corporate executives & boards will be
increasingly held accountable for
breaches that damage their corporate
brand, so their level of involvement in
security strategy will increase. Security
will shift from an “IT problem” to an
“Executive problem”. Concerns over
“denial of business” (DoB) will drive
increased Board oversight.
Identify
Protect
DetectRespond
Recover
Security Strategy & Infrastructure
(example: NIST Cybersecurity Infrastructure)
Corporate &
Customer Info
Board
25 © 2014 CA. ALL RIGHTS RESERVED.
APIsApps
CA SECURITY
Simple, Seamless Security
DEV & TEST DEPLOY OPERATE
PLAN MEASURE
CA MANAGEMENT CLOUD
Business Alignment
CA DEVOPS
Agile Development & Operations
Those who build the apps will own the future ...
and those apps rely on CA Technologies
26 © 2015 CA. TODOS LOS DERECHOS RESERVADOS.© 2015 CA. Todos los derechos reservados.
Gracias
¿Preguntas?

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararamanagilemaine
 
Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28space150
 
pwc-insurance-2020-and-beyond
pwc-insurance-2020-and-beyondpwc-insurance-2020-and-beyond
pwc-insurance-2020-and-beyondMarie Carr
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary ReportBill Chamberlin
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print InfographicEricsson
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
What China Taught Us about Internet
What China Taught Us about InternetWhat China Taught Us about Internet
What China Taught Us about InternetYan Di
 
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Ericsson Latin America
 
Reach Your Target Audiences, Strategies and Technologies in Mobile Advertising
Reach Your Target Audiences, Strategies and Technologies in Mobile AdvertisingReach Your Target Audiences, Strategies and Technologies in Mobile Advertising
Reach Your Target Audiences, Strategies and Technologies in Mobile AdvertisingVivastream
 
What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 Ogilvy Consulting
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BI Intelligence
 
Generation-IoT - The Key to Business Survival in 21st Century
Generation-IoT -  The Key to Business Survival in 21st CenturyGeneration-IoT -  The Key to Business Survival in 21st Century
Generation-IoT - The Key to Business Survival in 21st CenturyDr. Mazlan Abbas
 
A Day In Our Lives Without Data
A Day In Our Lives Without DataA Day In Our Lives Without Data
A Day In Our Lives Without DataNetApp
 
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFrederik Hermann
 
The 2016 IT Trend Showcase
The 2016 IT Trend ShowcaseThe 2016 IT Trend Showcase
The 2016 IT Trend Showcaseflowil
 
NATIVE VML Trends Report MAY 2015
NATIVE VML Trends Report MAY 2015NATIVE VML Trends Report MAY 2015
NATIVE VML Trends Report MAY 2015VML South Africa
 
Chinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointChinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointApp Annie
 

Was ist angesagt? (20)

Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararaman
 
Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28Connected Technology: Trending the Future | space150 v28
Connected Technology: Trending the Future | space150 v28
 
pwc-insurance-2020-and-beyond
pwc-insurance-2020-and-beyondpwc-insurance-2020-and-beyond
pwc-insurance-2020-and-beyond
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
 
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
Wearable Computing:  A 2014 HorizonWatching Trend Summary ReportWearable Computing:  A 2014 HorizonWatching Trend Summary Report
Wearable Computing: A 2014 HorizonWatching Trend Summary Report
 
Connected Print Infographic
Connected Print InfographicConnected Print Infographic
Connected Print Infographic
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
What China Taught Us about Internet
What China Taught Us about InternetWhat China Taught Us about Internet
What China Taught Us about Internet
 
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
Liberation from Location: Ericsson ConsumerLab Insight Report, Latin America ...
 
Reach Your Target Audiences, Strategies and Technologies in Mobile Advertising
Reach Your Target Audiences, Strategies and Technologies in Mobile AdvertisingReach Your Target Audiences, Strategies and Technologies in Mobile Advertising
Reach Your Target Audiences, Strategies and Technologies in Mobile Advertising
 
What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015
 
Generation-IoT - The Key to Business Survival in 21st Century
Generation-IoT -  The Key to Business Survival in 21st CenturyGeneration-IoT -  The Key to Business Survival in 21st Century
Generation-IoT - The Key to Business Survival in 21st Century
 
A Day In Our Lives Without Data
A Day In Our Lives Without DataA Day In Our Lives Without Data
A Day In Our Lives Without Data
 
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik HermannFIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
FIDM SF | 8th Annual Innovative Materials Conference | Huami / Frederik Hermann
 
The 2016 IT Trend Showcase
The 2016 IT Trend ShowcaseThe 2016 IT Trend Showcase
The 2016 IT Trend Showcase
 
NATIVE VML Trends Report MAY 2015
NATIVE VML Trends Report MAY 2015NATIVE VML Trends Report MAY 2015
NATIVE VML Trends Report MAY 2015
 
Chinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointChinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping Point
 

Andere mochten auch

Soluciones olimpíadas 6to
Soluciones olimpíadas 6toSoluciones olimpíadas 6to
Soluciones olimpíadas 6tomdarosa44
 
поклонимся великим тем годам
поклонимся великим тем годампоклонимся великим тем годам
поклонимся великим тем годамmsikanov
 
7 апреля всемирный день здоровья
7 апреля всемирный день здоровья7 апреля всемирный день здоровья
7 апреля всемирный день здоровьяmsikanov
 
Week 16 (2014) Applications and implications
Week 16 (2014) Applications and implicationsWeek 16 (2014) Applications and implications
Week 16 (2014) Applications and implicationsVaneza Caycho Ñuflo
 
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...msikanov
 
Week 4 (2014) Electronics Production
Week 4 (2014) Electronics ProductionWeek 4 (2014) Electronics Production
Week 4 (2014) Electronics ProductionVaneza Caycho Ñuflo
 
производство клиентов константин холстинин
производство клиентов константин холстининпроизводство клиентов константин холстинин
производство клиентов константин холстининholstinin.com Business Engineering Services
 
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...Asociación de Marketing Bancario Argentino
 
Week 8 (2014) Embedded programming
Week 8 (2014) Embedded programmingWeek 8 (2014) Embedded programming
Week 8 (2014) Embedded programmingVaneza Caycho Ñuflo
 
защитники отечества
защитники отечествазащитники отечества
защитники отечестваmsikanov
 
OptionC Parent Tutorial 2015-2016
OptionC Parent Tutorial 2015-2016OptionC Parent Tutorial 2015-2016
OptionC Parent Tutorial 2015-2016tsell
 
Senior project paper
Senior project paper Senior project paper
Senior project paper NickLogston
 

Andere mochten auch (20)

Soluciones olimpíadas 6to
Soluciones olimpíadas 6toSoluciones olimpíadas 6to
Soluciones olimpíadas 6to
 
Picasa[1]
Picasa[1]Picasa[1]
Picasa[1]
 
Technology drivers
Technology driversTechnology drivers
Technology drivers
 
Breaking music story
Breaking music storyBreaking music story
Breaking music story
 
поклонимся великим тем годам
поклонимся великим тем годампоклонимся великим тем годам
поклонимся великим тем годам
 
7 апреля всемирный день здоровья
7 апреля всемирный день здоровья7 апреля всемирный день здоровья
7 апреля всемирный день здоровья
 
Week 16 (2014) Applications and implications
Week 16 (2014) Applications and implicationsWeek 16 (2014) Applications and implications
Week 16 (2014) Applications and implications
 
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
1пошагово детальное преподавание информации,ее усвоение, уменьшение искажений...
 
Week 12 (2014) Output devices
Week 12 (2014) Output devicesWeek 12 (2014) Output devices
Week 12 (2014) Output devices
 
Twitter
TwitterTwitter
Twitter
 
Week 4 (2014) Electronics Production
Week 4 (2014) Electronics ProductionWeek 4 (2014) Electronics Production
Week 4 (2014) Electronics Production
 
производство клиентов константин холстинин
производство клиентов константин холстининпроизводство клиентов константин холстинин
производство клиентов константин холстинин
 
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...
Productos y Servicios Innovadores en Tecnología Digital para la industria Fin...
 
Week 8 (2014) Embedded programming
Week 8 (2014) Embedded programmingWeek 8 (2014) Embedded programming
Week 8 (2014) Embedded programming
 
You tube[1]
You tube[1]You tube[1]
You tube[1]
 
การป้องกันอุบัติเหตุ
การป้องกันอุบัติเหตุการป้องกันอุบัติเหตุ
การป้องกันอุบัติเหตุ
 
защитники отечества
защитники отечествазащитники отечества
защитники отечества
 
집단
집단집단
집단
 
OptionC Parent Tutorial 2015-2016
OptionC Parent Tutorial 2015-2016OptionC Parent Tutorial 2015-2016
OptionC Parent Tutorial 2015-2016
 
Senior project paper
Senior project paper Senior project paper
Senior project paper
 

Ähnlich wie La Seguridad en la Economía de las Aplicaciones

CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014JAX Chamber IT Council
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) Lori MacVittie
 
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...CA Technologies
 
The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyCA Technologies
 
Low Code Platforms - Ebook
Low Code Platforms - EbookLow Code Platforms - Ebook
Low Code Platforms - EbookWaveMaker, Inc.
 
2016 Ideas Hakathon_Power Human-Machine Communication
2016 Ideas Hakathon_Power Human-Machine Communication2016 Ideas Hakathon_Power Human-Machine Communication
2016 Ideas Hakathon_Power Human-Machine Communicationideashackathon
 
Disruption and the New Kingmakers: Software Developers and Payment Services
Disruption and the New Kingmakers: Software Developers and Payment ServicesDisruption and the New Kingmakers: Software Developers and Payment Services
Disruption and the New Kingmakers: Software Developers and Payment ServicesJames Governor
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
Leveraging B2B mobile apps
Leveraging B2B mobile appsLeveraging B2B mobile apps
Leveraging B2B mobile appsBGGMobile.com
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of InnovationAPIsecure_ Official
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retailCloudera, Inc.
 
CA Mobile Application Analytics - Julio 2015
CA Mobile Application Analytics - Julio 2015CA Mobile Application Analytics - Julio 2015
CA Mobile Application Analytics - Julio 2015Fernando Bianchi
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...Paul Brody
 
Equinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix
 
Thriving in the Mobile App Economy: Mobility Market Overview & Strategy
Thriving in the Mobile App Economy: Mobility Market Overview & StrategyThriving in the Mobile App Economy: Mobility Market Overview & Strategy
Thriving in the Mobile App Economy: Mobility Market Overview & StrategyCA Technologies
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleDenim Group
 

Ähnlich wie La Seguridad en la Economía de las Aplicaciones (20)

CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
 
CA Mobile App Analytics
CA Mobile App Analytics CA Mobile App Analytics
CA Mobile App Analytics
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
CA Continuous Application Insight: Discovery, Insight, Automation for Paralle...
 
The Five Essential Truths of the Application Economy
The Five Essential Truths of the Application EconomyThe Five Essential Truths of the Application Economy
The Five Essential Truths of the Application Economy
 
Low Code Platforms - Ebook
Low Code Platforms - EbookLow Code Platforms - Ebook
Low Code Platforms - Ebook
 
2016 Ideas Hakathon_Power Human-Machine Communication
2016 Ideas Hakathon_Power Human-Machine Communication2016 Ideas Hakathon_Power Human-Machine Communication
2016 Ideas Hakathon_Power Human-Machine Communication
 
Disruption and the New Kingmakers: Software Developers and Payment Services
Disruption and the New Kingmakers: Software Developers and Payment ServicesDisruption and the New Kingmakers: Software Developers and Payment Services
Disruption and the New Kingmakers: Software Developers and Payment Services
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Leveraging B2B mobile apps
Leveraging B2B mobile appsLeveraging B2B mobile apps
Leveraging B2B mobile apps
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation
 
The digital transformation of retail
The digital transformation of retailThe digital transformation of retail
The digital transformation of retail
 
CA Mobile Application Analytics - Julio 2015
CA Mobile Application Analytics - Julio 2015CA Mobile Application Analytics - Julio 2015
CA Mobile Application Analytics - Julio 2015
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
 
Equinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant Boost
 
Thriving in the Mobile App Economy: Mobility Market Overview & Strategy
Thriving in the Mobile App Economy: Mobility Market Overview & StrategyThriving in the Mobile App Economy: Mobility Market Overview & Strategy
Thriving in the Mobile App Economy: Mobility Market Overview & Strategy
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at ScaleOptimizing Security Velocity in Your DevSecOps Pipeline at Scale
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
 

Mehr von Asociación de Marketing Bancario Argentino

Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...
Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...
Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...Asociación de Marketing Bancario Argentino
 
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...Asociación de Marketing Bancario Argentino
 
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA: Un caso de éxito cont...
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA:  Un caso de éxito cont...EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA:  Un caso de éxito cont...
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA: Un caso de éxito cont...Asociación de Marketing Bancario Argentino
 

Mehr von Asociación de Marketing Bancario Argentino (20)

"Tarjetas de Crédito, en el Banco Digital" - por Damian Otaegui
"Tarjetas de Crédito, en el Banco Digital" - por Damian Otaegui"Tarjetas de Crédito, en el Banco Digital" - por Damian Otaegui
"Tarjetas de Crédito, en el Banco Digital" - por Damian Otaegui
 
Innovación - Por Alejandra Rodriguez
Innovación - Por Alejandra RodriguezInnovación - Por Alejandra Rodriguez
Innovación - Por Alejandra Rodriguez
 
Presentación Verint
Presentación VerintPresentación Verint
Presentación Verint
 
Nubi: Un producto pensado para el cliente - por Felipe Kusserow
Nubi: Un producto pensado para el cliente - por Felipe KusserowNubi: Un producto pensado para el cliente - por Felipe Kusserow
Nubi: Un producto pensado para el cliente - por Felipe Kusserow
 
¿Banco o Empresa de Tecnologia Financiera? - por Walter Risi
¿Banco o Empresa de Tecnologia Financiera? - por Walter Risi¿Banco o Empresa de Tecnologia Financiera? - por Walter Risi
¿Banco o Empresa de Tecnologia Financiera? - por Walter Risi
 
La Divina Comedia Digital - por Esteban Socorro
La Divina Comedia Digital - por Esteban SocorroLa Divina Comedia Digital - por Esteban Socorro
La Divina Comedia Digital - por Esteban Socorro
 
Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...
Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...
Digital Transformation, The Future of the "Digital Experience" - Por Kwafo Of...
 
Santiago Sinelnicof - Cultura Avierta para la Innovación Eficaz
Santiago Sinelnicof - Cultura Avierta para la Innovación EficazSantiago Sinelnicof - Cultura Avierta para la Innovación Eficaz
Santiago Sinelnicof - Cultura Avierta para la Innovación Eficaz
 
Alejandra Rodriguez - Innovación
Alejandra Rodriguez - InnovaciónAlejandra Rodriguez - Innovación
Alejandra Rodriguez - Innovación
 
Presentacion Miguez Diez, Genesys - Club Banca Digital Julio
Presentacion Miguez Diez, Genesys - Club Banca Digital JulioPresentacion Miguez Diez, Genesys - Club Banca Digital Julio
Presentacion Miguez Diez, Genesys - Club Banca Digital Julio
 
Presentación Guillermo Tolosa, ICBC - Club Banca Digital Julio
Presentación Guillermo Tolosa, ICBC - Club Banca Digital JulioPresentación Guillermo Tolosa, ICBC - Club Banca Digital Julio
Presentación Guillermo Tolosa, ICBC - Club Banca Digital Julio
 
Factores de éxito en la transformación digital
Factores de éxito en la transformación digitalFactores de éxito en la transformación digital
Factores de éxito en la transformación digital
 
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...
TRANSFORMACIÓN DIGITAL EN EL PROCESO DE "VENTA SIN PAPEL” DE PRODUCTOS EN BAN...
 
MACHINE LEARNING EN OPERACIONES DE TI. CASO ICBC ARGENTINA.
MACHINE LEARNING EN OPERACIONES DE TI. CASO ICBC ARGENTINA.MACHINE LEARNING EN OPERACIONES DE TI. CASO ICBC ARGENTINA.
MACHINE LEARNING EN OPERACIONES DE TI. CASO ICBC ARGENTINA.
 
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA: Un caso de éxito cont...
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA:  Un caso de éxito cont...EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA:  Un caso de éxito cont...
EL DESAFÍO DE LA INCLUSIÓN FINANCIERA EN LA ARGENTINA: Un caso de éxito cont...
 
"Coquetear con el envejecimiento"
"Coquetear con el envejecimiento" "Coquetear con el envejecimiento"
"Coquetear con el envejecimiento"
 
Monedas virtuales
Monedas virtualesMonedas virtuales
Monedas virtuales
 
Viaje en billetera al mundo extrabancario
Viaje en billetera al mundo extrabancarioViaje en billetera al mundo extrabancario
Viaje en billetera al mundo extrabancario
 
Experiencia del Cliente. De la teoría a la práctica
Experiencia del Cliente. De la teoría a la prácticaExperiencia del Cliente. De la teoría a la práctica
Experiencia del Cliente. De la teoría a la práctica
 
Los desafíos de la innovación en un mundo exponencial
Los desafíos de la innovación en un mundo exponencialLos desafíos de la innovación en un mundo exponencial
Los desafíos de la innovación en un mundo exponencial
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

La Seguridad en la Economía de las Aplicaciones

  • 1. La Seguridad en la Economía de las Aplicaciones Mayo 2015 Denyson Machado Sr Director Sales Security - LATAM
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED. 1http://www.gartner.com/newsroom/id/2654115 2http://www.gartner.com/newsroom/id/2352816 3Gartner predicts, 2013 - Application Development “Software is eating the world” - Marc Andreeson A perfect technology storm of mobile apps, connected products, social connections, data analytics, and cloud computing continually raises customer expectations for quality in every industry.3 $131B worldwide spending on public cloud service2 50% of B2B collaboration will take place through APIs by 20163 268B projected number of mobile app downloads by 20171 APPLICATION ECONOMY Welcome to the
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED. Application Quality and User Experience are Critical Increasing Customer Expectations & Impact Sources: *Aberdeen Group, Reaching the Top of the Web Performance Mountain, March 2013 Digital Trends, Are you a rarity? Only 16 percent of people will try out an app more than twice, March 2013 RT.com, NASDAQ longest downtime adds to woes over glitches in electronic trading, Aug 2013 of users will abandon a web application after just three seconds of delay* 80-90% of all consumer applications will only be used ONCE cost of trading losses during Facebook IPO due to ‘system problems’ 25% $500M
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED. Your Apps are Something You are Not just Something You do…
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED. Digitally Connected Banking Huge Opportunities 2015 Brazilian bank innovates with first banking app for Ford Applink mobile banking users by 2019 ** Sources: * McKinsey & Company, August 2014, “The future of US retail-banking distribution” ** Juniper Research, July 2014, Press Release of customers interact with their banks through multiple channels * 1.75B 65%
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED. Understanding Your Market & Consumers Challenge to Meet Expectations Source: Accenture, 2014 North America Consumer Digital Banking Survey, “The Digital Disruption in Banking” 27% Would consider a branchless digital bank 71% Consider their banking relationship to be transactional rather than relationship driven 51% Want their bank to proactively recommend products and services for their financial needs 48% Are interested in real- time and forward- looking spending analysis
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED. Understanding “New Competitors”… Source: Accenture, 2014 North America Consumer Digital Banking Survey, “The Digital Disruption in Banking” Q: If these companies offered banking services how likely would you be to bank with them? Percent of customers which would likely bank with each non-bank with which they do business. 14% 15% 16% 17% 17% 17% 17% 18% 19% 20% 20% 21% 21% 21% 23% 26% 26% 26% 29% 29% 29% 31% 41% 50% Shoppers Drug Mart (Canadian only) CVS (US only) Bell Mobility (Canadian only) Wallgreens (US only) Target UPS Rogers Wireless (Canadian only) Verizon Wireless (US only) eBay FedEx United States Postal Service (US only) Yahoo Telus Mobility (Canadian only) Canadia Post (Canadian only) Walmart Sprint (US only) AT&T Mobility (US only) Amazon Google Apple Costco T-Mobile (US only) PayPal Square
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED. 3 Themes? TO MEET THESE CHALLENGES, BANKS SHOULD ADVANCE ON THREE FRONTS: 1 Become truly omnichannel by seamlessly integrating the customer experience across in-branch, assisted, and digital interactions 2 Extend the ecosystem by offering a greater range of services for their customer 3 Offer digital personalized financial advice and counseling to their customer to help them better manage their financial needs BE SECURE
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED. Security concerns the top obstacle in app economy#1 -- CA Technologies with Vanson Bourne Increase in Breaches YoY from 2013 to 2014 78% Leaders saw revenue increase for security- enabled services (18% of Laggards) 47% Security priority for business is improving mobile experience #2 Overall IT spend devoted to Security over next 3 years >25% Security
  • 10. Security Enables & Protects the business in the App Economy PROTECT THE BUSINESS Secure access to on-premise and cloud applications Govern user access across enterprise Protect against insider threats and external attacks ENABLE THE BUSINESS Accelerate the delivery of secure applications Deliver services across customer channels – from Web to Mobile to APIs Provide consumers an Amazing user experience OPEN ENTERPRISE
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED. Developer Communities Partners/Divisions Customers Employees / Contractors Mobile / IoT Cloud Services On Premise Desktop / Web IDENTITY IS HOW YOU PROTECT ACCESS TO DATA & APPLICATION APIS ARE HOW YOU CONNECT DATA & APPLICATIONS
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED. In the App Economy the Identity is the New Perimeter Customers Citizens Employees / Partners Connected Apps / Devices Cloud Services On Premise Apps
  • 13. And Secured APIs will Enable the Digital Success APIs IOT DEVICES CLOUD MOBILE PARTNERS/EXTERNAL DIVISIONS EXTERNAL DEVELOPERS Data Data Your New Digital Business
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED. Security in the App Economy
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED. --on average, a new type of malware was discovered every 3.75 seconds! In 2014 as a whole, just under six million new malware strains were seen in the wild, some 77% more than 2013's total. -- more than double the number of distributed denial of service attacks in the first quarter of 2015 compared to first quarter 2014. -- with a potentially dangerous trend in the 2015 attacks, with peak DDoS attacks of 100 Gbps making up a significantly bigger part of the total. --malware developers are mainly targeting the ubiquitous Microsoft platforms, with malware programmed as .NET applications continuing to rise. Overall, new variants for Windows platforms made up 99.9 percent of the new malware variants.
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED. Increasingly public breaches will cause shift from IDM to Identity Access Security (IAS) PREDICTION #1 Recent breaches (Target, SONY, Lowe’s) have IT executives running scared. As the financial & reputational damage of a breach increases, they will be increasing their security budgets to increase their controls over systems, data, and insider actions. 70% of Companies Report a Security Breach in Last 12 Months Source: Ponemon Institute Source: Ponemon Institute Security budgets will increase in the next 3 years 39% REPORT: Cybercrime costs US $12.7M a year The cost of attacks on large companies is up by 10 percent Average company now compromised every four days, with no end to the cybercrime wave in sight Summary: Phishing, denial- of-service and virus attacks are now a standard part of doing business for most organizations.
  • 17. 17 © 2014 CA. All rights reserved. CA confidential and proprietary information; for internal use only. No unauthorized use, copying or distribution. Multi-Factor Risk Based Identity Management EmployeesCustomers Partners Access Controls Privileged Access Privileged Identity Management Black Hats Web Access Management Federation Cloud Services DCs APIs
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED. The rise of the Application Economy will drive the need for an “identity dial-tone” to span all apps, helping to accelerate new app deployment PREDICTION #2 There will be an Increased need for universal access to identity information across the enterprise. Apps of all kinds will need easy access to identity & entitlement info, and it will increasing be available thru identity system APIs. A common “identity dial-tone” will help simplify app development, and spur new innovative initiatives Identity “dial-tone” Employees Customers Partners Cloud Apps Mobile Apps On-Prem Apps
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED. Universal authentication comes to your pocket or purse PREDICTION #3 There will be increased focus on authentication, driven by factors such as Obama’s executive order (for multi-factor authentication), chip and pin technology, etc. Many authentication trends will begin to converge – biometrics, geolocation, context, etc. Organizations will strive for “zero- touch authentication” to deliver as near a password-free an experience for their customers and employees as possible. Increasingly, the phone will be used as a universal authenticator. Device as universal authenticator Passwords Conduct a transaction Control a connected device (eg open a door) Connect to an app
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED. • 10-15% market • “Walled garden” • iOS 8 • ~77% adoption • 80-85% market • Open source • Lollipop, but let’s look at Kit Kat… • ~40% adoption
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED. IoT: Toilet Attack? • Luxury toilet that can be controlled via Android app • Connection to the any toilet is done via the Bluetooth of the device
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED. Mobility & IoT drives the emergence of API- first architectures PREDICTION #4 Apps (esp mobile apps) need to have reduced delivery times. But, traditional middleware is heavy and difficult to use to build these apps on. The rise of mobile and IoT will drive a move towards lighter- weight, API-first architectures in order to more easily connect these (and other devices) into the digital ecosystem. APIs LIGHTER-WEIGHT, API-BASED ARCHITECTURES Developers Customers Employees Cloud Services On-Premise Web Mobile loT IDENTITIES DEVICE TYPES APP TYPES Today there are 1.5 connected devices per person in the world. By 2020, there will be 8 devices per person Biztech Magazine
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED. Increased board visibility into corporate security strategy PREDICTION #5 Corporate executives & boards will be increasingly held accountable for breaches that damage their corporate brand, so their level of involvement in security strategy will increase. Security will shift from an “IT problem” to an “Executive problem”. Concerns over “denial of business” (DoB) will drive increased Board oversight. Identify Protect DetectRespond Recover Security Strategy & Infrastructure (example: NIST Cybersecurity Infrastructure) Corporate & Customer Info Board
  • 25. 25 © 2014 CA. ALL RIGHTS RESERVED. APIsApps CA SECURITY Simple, Seamless Security DEV & TEST DEPLOY OPERATE PLAN MEASURE CA MANAGEMENT CLOUD Business Alignment CA DEVOPS Agile Development & Operations Those who build the apps will own the future ... and those apps rely on CA Technologies
  • 26. 26 © 2015 CA. TODOS LOS DERECHOS RESERVADOS.© 2015 CA. Todos los derechos reservados. Gracias ¿Preguntas?