Security Remastered: Building Security and Identity into Your Digital DNA

11
1 © 2016 CA. ALL RIGHTS RESERVED. SECURITY REMASTERED Building security and identity management into your digital DNA

Transcript of Security Remastered: Building Security and Identity into Your Digital DNA

1 © 2016 CA. ALL RIGHTS RESERVED.

SECURITY REMASTEREDBuilding security and identity management into your digital DNA

2 © 2016 CA. ALL RIGHTS RESERVED.

In the application economy, success can depend on a company’s ability to deliver engaging customer experiences through software.

But software-focused business models create a whole range of new cybersecurity challenges―one of the most important being how to balance user experience and security.

The Security Challenges of the App Economy

2

3 © 2016 CA. ALL RIGHTS RESERVED.

The app economy is defined by software running and communicating on connected devices ranging from phones to cars to home appliances.

3

It is predicted that there will be 200 billion connected devices in the world by 2020.1

Each new app, device and communication creates a new way to engage customers. But each also represents a new opportunity for cybercriminals.

1 Intel,” A Guide to the Internet of Things,” http://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html

4 © 2016 CA. ALL RIGHTS RESERVED.

Two key factors contribute to a highly complex and challenging enterprise security landscape in the application economy:

4

Customer expectations are rising―app consumers expect enterprises to deliver advanced features, seamless access and strong privacy protection.

The increasing number of autonomous interactions between smart devices demands security that goes far beyond usernames and passwords.

1

2

5 © 2016 CA. ALL RIGHTS RESERVED.

The app economy has eliminated traditional IT boundaries as enterprises are increasingly opening sensitive systems to various apps and devices.

Identity is the New Enterprise Perimeter

5

In this context, the enterprise boundary has moved all the way out to the user. Therefore, user identity must be the central concern of IT security.

6 © 2016 CA. ALL RIGHTS RESERVED.6

An identity-focused security strategy should consider three key facts of cybersecurity in the application economy:

Customers will not tolerate invasive or inconvenient security procedures.

There are billions of human and machine identities that must be managed.

Security threats are everywhere and attacks are constant.

1

2

3

7 © 2016 CA. ALL RIGHTS RESERVED.7

THOSE ARE THE FACTS.

So, how can you address them?

8 © 2016 CA. ALL RIGHTS RESERVED.8

In the application economy, security needs to be a core consideration of all software development, from the very beginning.

It must be considered at every stage of development to ensure all touch points are secured and balance is achieved between security and usability.

Make security your killer app.1

9 © 2016 CA. ALL RIGHTS RESERVED.9

Protect and monitor privileged identities.2

Identities with privileges to edit key settings and access sensitive data have become one of the key targets for hackers and cybercriminals.

It’s important to grant the minimum amount of privileged access needed for systems to functionand to closely monitor how this access is used.

10 © 2016 CA. ALL RIGHTS RESERVED.

Managing identity and access in a highly connected world often requires stronger multi-factor authentication methods.

At the same time, gaining access can be made less onerous for legitimate users via single sign-on, social login and risk-based authentication.

Go beyond the username and password.3

11 © 2016 CA. ALL RIGHTS RESERVED.

Digitally RemasteredIntegrating Security to Fuel Your Transformation

To learn more about the role of security in digital transformation and the application economy, download this free excerpt from the new book by Otto Berkes: “Digitally Remastered: Building Software into Your Business DNA”.

11 © 2016 CA. ALL RIGHTS RESERVED.

Read the Excerpt