ibm security systems division · ibm security systems 6 in this “new normal”, organizations...
TRANSCRIPT
© 2012 IBM Corporation
IBM Security Systems
1© 2012 IBM Corporation
IBM Security Systems DivisionIntelligence, Integration and ExpertiseFebruary 2013
Shiraz Baksh, Security Systems Division Sales Specialist
© 2012 IBM Corporation
IBM Security Systems
2
The world is becoming more digitized and interconnected,opening the door to emerging threats and leaks…
Organizations continue to move to newplatforms including cloud, virtualization,mobile, social business and more
EVERYTHINGIS EVERYWHERE
With the advent of Enterprise 2.0, socialbusiness and BYOD, the line betweenpersonal and professional hours, devices anddata has disappeared
CONSUMERIZATIONOF IT
The age of Big Data – the explosion of digitalinformation – has arrived and is facilitated bythe pervasiveness of applications accessedfrom everywhere
DATAEXPLOSION
The speed and dexterity of attacks hasincreased coupled with new actors with newmotivations from cyber crime to terrorismto state-sponsored intrusions
ATTACKSOPHISTICATION
© 2012 IBM Corporation
IBM Security Systems
3
Proof points: Targeted attacks shake businesses & governments
Source: IBM X-Force® 2011 Trend and Risk Report
© 2012 IBM Corporation
IBM Security Systems
4
IT Security is a board room discussion
Businessresults
Supply chain Legalexposure
Impact ofhacktivism
Audit riskBrand image
*Sources for all breaches shown in speaker notes
© 2012 IBM Corporation
IBM Security Systems
5
Solving a security issue is a complex, four-dimensional puzzle
5
People
Data
Applications
Infrastructure
Employees Consultants Hackers Terrorists Outsourcers Customers Suppliers
Systemsapplications Web applications Web 2.0 Mobile apps
Structured Unstructured At rest In motion
It is no longer enough to protect the perimeter –siloed point products will not secure the enterprise
© 2012 IBM Corporation
IBM Security Systems
6
In this “new normal”, organizations need an intelligent view of theirsecurity posture
Security
Intelligence
Proficient
Proactive
Aut
omat
edM
anua
l
Reactive
Proficient
Basic
Optimized OptimizedOrganizations usepredictive andautomated securityanalytics to drive towardsecurity intelligence
ProficientSecurity is layeredinto the IT fabric andbusiness operations
BasicOrganizations
employ perimeterprotection, which
regulates access andfeeds manual reporting
© 2012 IBM Corporation
IBM Security Systems
7
IBM Security: Delivering intelligence, integration and expertise across acomprehensive framework
Intelligence ● Integration ● ExpertiseIntelligence ● Integration ● Expertise
Only vendor in the market with end-to-end coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force® research Largest vulnerability database in the
industry
© 2012 IBM Corporation
IBM Security Systems
8
Security Intelligence is enabling progress to optimized security
Optimized
Security Intelligence:Information and event management
Advanced correlation and deep analyticsExternal threat research
Role based analytics
Identity governance
Privileged usercontrols
Data flow analytics
Data governance
Secure appengineeringprocesses
Fraud detection
Advanced networkmonitoring
Forensics / datamining
Secure systems
ProficientUser provisioning
Access mgmt
Strong authentication
Access monitoring
Data loss prevention
Application firewall
Source codescanning
Virtualization security
Asset mgmt
Endpoint / networksecurity management
Basic Centralized directoryEncryption
Access controlApplication scanning
Perimeter security
Anti-virus
People Data Applications Infrastructure
SecurityIntelligence
© 2012 IBM Corporation
IBM Security Systems
9Products Services
Intelligence: A comprehensive portfolio of products and services
New in 2012
© 2012 IBM Corporation
IBM Security Systems
10
Domain Segment / Report Analyst RecognitionSecurity
Intelligence,Analytics and
GRC
Security Information & Event Management (SIEM) 2012 2010
Enterprise Governance Risk & Compliance Platforms 2011 2011
People
Identity & Access Governance 2012
User Provisioning / Administration 20122012***
2010
Role Management & Access Recertification 2011
Enterprise Single Sign-on (ESSO) 2011*
Web Access Management (WAM) 2012**
DataDatabase Auditing & Real-Time Protection 2011
Data Masking 2013
ApplicationsStatic Application Security Testing (SAST) 2010
2010Dynamic Application Security Testing (DAST) 2011
InfrastructureNetwork Intrusion Prevention Systems (NIPS) 2012 2010
EndPoint Protection Platforms (EPP) 2013
Analysts recognize IBM’s superior products and performance
ChallengerLeader Visionary Niche Player
Leader ContenderStrong Performer
Leader (#1, 2, or 3 in segment)
V13-05* Gartner MarketScope (discontinued in 2012)** Gartner MarketScope*** 2012 IDC MarketScape ranked IBM #1 in IAM
© 2012 IBM Corporation
IBM Security Systems
11
Expertise: Unmatched global coverage and security awareness
20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)
20,000+ devices under contract 3,700+ MSS clients worldwide 9B+ events managed per day 1,000+ security patents 133 monitored countries (MSS)
World Wide ManagedSecurity Services Coverage
Security Operations Centers
Security Research Centers
Security Solution Development Centers
Institute for Advanced Security Branches
IBM Research
© 2012 IBM Corporation
IBM Security Systems
12
SecurityIntelligence,Analytics &
GRC
People
Data
Applications
Infrastructure
Intelligent solutions provide the DNA to secure a Smarter Planet
© 2012 IBM Corporation
IBM Security Systems
13
ibm.com/security
© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposesonly, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the useof, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating anywarranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreementgoverning the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available inall countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s solediscretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in anyway. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the UnitedStates, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
© 2012 IBM Corporation
IBM Security Systems
14
Videos
Introduce CyberCrime Topichttp://www.youtube.com/watch?v=iSx6NWNPoDc
What is X-Force - 2min Videohttp://www.youtube.com/watch?v=YPqRC_fI-_Y&feature=relmfu
Security Commercialshttp://www.youtube.com/watch?v=4mEojERizjc
http://www.youtube.com/watch?v=rLDxOh8a2w0&list=UUlAgZm2OXFpX8WoMsOpWoXA&index=3&feature=plcp