Transcript
Page 1: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

1© 2012 IBM Corporation

IBM Security Systems DivisionIntelligence, Integration and ExpertiseFebruary 2013

Shiraz Baksh, Security Systems Division Sales Specialist

Page 2: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

2

The world is becoming more digitized and interconnected,opening the door to emerging threats and leaks…

Organizations continue to move to newplatforms including cloud, virtualization,mobile, social business and more

EVERYTHINGIS EVERYWHERE

With the advent of Enterprise 2.0, socialbusiness and BYOD, the line betweenpersonal and professional hours, devices anddata has disappeared

CONSUMERIZATIONOF IT

The age of Big Data – the explosion of digitalinformation – has arrived and is facilitated bythe pervasiveness of applications accessedfrom everywhere

DATAEXPLOSION

The speed and dexterity of attacks hasincreased coupled with new actors with newmotivations from cyber crime to terrorismto state-sponsored intrusions

ATTACKSOPHISTICATION

Page 3: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

3

Proof points: Targeted attacks shake businesses & governments

Source: IBM X-Force® 2011 Trend and Risk Report

Page 4: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

4

IT Security is a board room discussion

Businessresults

Supply chain Legalexposure

Impact ofhacktivism

Audit riskBrand image

*Sources for all breaches shown in speaker notes

Page 5: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

5

Solving a security issue is a complex, four-dimensional puzzle

5

People

Data

Applications

Infrastructure

Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers

Systemsapplications Web applications Web 2.0 Mobile apps

Structured Unstructured At rest In motion

It is no longer enough to protect the perimeter –siloed point products will not secure the enterprise

Page 6: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

6

In this “new normal”, organizations need an intelligent view of theirsecurity posture

Security

Intelligence

Proficient

Proactive

Aut

omat

edM

anua

l

Reactive

Proficient

Basic

Optimized OptimizedOrganizations usepredictive andautomated securityanalytics to drive towardsecurity intelligence

ProficientSecurity is layeredinto the IT fabric andbusiness operations

BasicOrganizations

employ perimeterprotection, which

regulates access andfeeds manual reporting

Page 7: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

7

IBM Security: Delivering intelligence, integration and expertise across acomprehensive framework

Intelligence ● Integration ● ExpertiseIntelligence ● Integration ● Expertise

Only vendor in the market with end-to-end coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability database in the

industry

Page 8: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

8

Security Intelligence is enabling progress to optimized security

Optimized

Security Intelligence:Information and event management

Advanced correlation and deep analyticsExternal threat research

Role based analytics

Identity governance

Privileged usercontrols

Data flow analytics

Data governance

Secure appengineeringprocesses

Fraud detection

Advanced networkmonitoring

Forensics / datamining

Secure systems

ProficientUser provisioning

Access mgmt

Strong authentication

Access monitoring

Data loss prevention

Application firewall

Source codescanning

Virtualization security

Asset mgmt

Endpoint / networksecurity management

Basic Centralized directoryEncryption

Access controlApplication scanning

Perimeter security

Anti-virus

People Data Applications Infrastructure

SecurityIntelligence

Page 9: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

9Products Services

Intelligence: A comprehensive portfolio of products and services

New in 2012

Page 10: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

10

Domain Segment / Report Analyst RecognitionSecurity

Intelligence,Analytics and

GRC

Security Information & Event Management (SIEM) 2012 2010

Enterprise Governance Risk & Compliance Platforms 2011 2011

People

Identity & Access Governance 2012

User Provisioning / Administration 20122012***

2010

Role Management & Access Recertification 2011

Enterprise Single Sign-on (ESSO) 2011*

Web Access Management (WAM) 2012**

DataDatabase Auditing & Real-Time Protection 2011

Data Masking 2013

ApplicationsStatic Application Security Testing (SAST) 2010

2010Dynamic Application Security Testing (DAST) 2011

InfrastructureNetwork Intrusion Prevention Systems (NIPS) 2012 2010

EndPoint Protection Platforms (EPP) 2013

Analysts recognize IBM’s superior products and performance

ChallengerLeader Visionary Niche Player

Leader ContenderStrong Performer

Leader (#1, 2, or 3 in segment)

V13-05* Gartner MarketScope (discontinued in 2012)** Gartner MarketScope*** 2012 IDC MarketScape ranked IBM #1 in IAM

Page 11: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

11

Expertise: Unmatched global coverage and security awareness

20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)

20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)

World Wide ManagedSecurity Services Coverage

Security Operations Centers

Security Research Centers

Security Solution Development Centers

Institute for Advanced Security Branches

IBM Research

Page 12: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

12

SecurityIntelligence,Analytics &

GRC

People

Data

Applications

Infrastructure

Intelligent solutions provide the DNA to secure a Smarter Planet

Page 13: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

13

ibm.com/security

© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposesonly, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the useof, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating anywarranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreementgoverning the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available inall countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in anyway. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the UnitedStates, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Page 14: IBM Security Systems Division · IBM Security Systems 6 In this “new normal”, organizations need an intelligent view of their security posture y ce t Proactive Automated Manual

© 2012 IBM Corporation

IBM Security Systems

14

Videos

Introduce CyberCrime Topichttp://www.youtube.com/watch?v=iSx6NWNPoDc

What is X-Force - 2min Videohttp://www.youtube.com/watch?v=YPqRC_fI-_Y&feature=relmfu

Security Commercialshttp://www.youtube.com/watch?v=4mEojERizjc

http://www.youtube.com/watch?v=rLDxOh8a2w0&list=UUlAgZm2OXFpX8WoMsOpWoXA&index=3&feature=plcp


Top Related