SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
IBM Software
IBM Security Products: Intelligence,
Integration, Expertise
A Comprehensive Framework for Any Environment from Mobile to Cloud
to Social to Unknown Futures
2 IBM Security Products: Intelligence, Integration, Expertise
Contents
2 A Hyper-Connected Business World
3 Security Intelligence for a New World
3 A Unique, Comprehensive Approach
5 Product Portfolio
10 Solutions for Today’s Challenges
12 Conclusion
12 For more Information
Labeled “The Year of the Security Breach” by the IBM X-Force research and development team, 2011 was marked by a high volume of severe and varied
security attacks.
Attack Type
2011 Sampling of Security Incidents by Attack Type, Time and Impact
conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
SQL Injection
URL Tampering
Spear Phishing
3rd Party Software
DDoS
SecureID
Trojan Software
Unknown
Gaming
Defense
Entertainment
Banking
Central
Government
Entertainment
National
Police
Central
Government
Entertainment
Central
Government
Central
Government
Central
Government
Central
Government
Entertainment
Central
Government
Entertainment
Defense
Defense
IT Security
IT Security
IT Security
Consulting
Banking
Consumer
Electronics
Marketing
Services
National
Police
State
Police
Gaming
Consumer
Electronics
State
Police
National
Police
Consumer
Electronics
Central
Government
Central
Government
Central
Government
Central
Government
Gaming Consulting
Defense
Financial
Market
Agriculture
Tele-
communications
Internet
Services
Consumer
Electronics
Heavy
Industry
Insurance
Internet
Services
Apparel
Gaming
Central
Government
Gaming
Gaming
Gaming
Gaming
Gaming Gaming
Government
Consulting
Online Services
Online
Services
Size of circle estimates relative impact of
breach in terms of cost to business
Jan Feb March April May June July Aug Sep Oct Nov Dec
A Hyper-Connected Business World
In today’s hyper-connected business world, a fundamentally
different approach is needed to secure the enterprise. The
explosion of digital business information that is accessed from
and stored on virtualized cloud and social platforms, instrumen-
tation, and mobile devices that are part consumer part business,
have created an overwhelmingly complex IT environment—
with possible attack points nearly limitless.
The most sophisticated adversaries are now perpetrating
Advanced Persistent Threats, using focus and persistence to
gain access to sensitive business information. These attacks uti-
lize cutting-edge methodologies, can last indefinitely and are
specifically targeted. The increased diversity of today’s threats
has eroded the effectiveness of traditional IT defenses such as
firewalls and antivirus—even bypassing these controls com-
pletely in many cases. A new approach is required, one that bal-
ances protection with detection, and advanced technology with
mature processes.
3IBM Software
Security Intelligence for a New World
Only those companies that have deployed solutions to monitor,
correlate and analyze the massive amounts of real-time events
being generated from a comprehensive, integrated security
infrastructure as well as from a well-researched external threat
feed have the capability to cost-effectively maintain an extremely
strong security posture. IBM calls this security intelligence.
In addition to helping detect and remediate breaches that
might otherwise have been missed, this approach can enable
organizations to:
●● ●
Shift from a reactive state to a proactive approach that better
aligns with business objectives
●● ●
Enable their business to deploy innovation initiatives far faster
than otherwise possible
●● ●
Automate their compliance activities
●● ●
Reduce staff requirements for security operations
A Unique, Comprehensive Approach
With leading products and services across segments and an over-
arching strategy based on three main tenets—Intelligence,
Integration and Expertise—IBM is helping its customers work
toward true security intelligence.
Intelligence
Human intelligence requires knowledge, information and the
ability to analyze this information to reach conclusions. In the
realm of enterprise security, this translates to needing visibility
into relevant networks and infrastructures and external threat
Moving from a reactive and manual approach to a proactive and automated
approach gives the organization an optimized security posture based in
security intelligence.
Security
Intelligence
Reactive ProactiveManualAutomated
O
ptim
ized
Proficient
Basic
The integration of security intelligence, X-Force research and core protection assets helps close the coverage gaps left by point product approaches.
Integrated Intelligence. Integrated Research. Integrated Protection.
Security Intelligence
People
A
pplications
Advanced Research
In
frastructure
Data
Security Intelligence
People
A
pplications
Advanced Research
I
nfrastructure
Data
Security Intelligence
People
Applications
Advanced Research
I
nfrastructure
Data
3rd Party
Ecosystem
4 IBM Security Products: Intelligence, Integration, Expertise
intelligence, plus the real-time correlation and analytics capabili-
ties to flag and remediate suspicious activities. IBM Security
offers these capabilities:
●● ●
Internal visibility: IBM security intelligence solutions analyze
information from IBM and non-IBM products and services in
real-time. They provide comprehensive analysis and insight
across all four areas of security risk: people, data, applications
and infrastructure.
●● ●
External threat visibility: The IBM® X-Force® threat intel-
ligence feed provides critical information from one of the
world’s largest repositories of threat and vulnerability insights
and is based on the real-time monitoring of 13 billion security
events per day. This insight can flag behavior that may be
associated with Advanced Persistent Threats and a wide range
of adversaries.
●● ●
Pinpoint analysis in an age of big data: IBM security intelli-
gence solutions can drill down to individual data elements to
analyze and query diverse activity. They provide insight on
network access at the periphery, external cloud services and
mobile devices, database activity at the core of a business, and
everywhere in between.
Integration
The integration of the comprehensive IBM portfolio of security
intelligence, X-Force research and core protection assets helps
reduce attackable weaknesses that arise from patched-together
security point products. It can also ease deployment, collapse
data silos for easier compliance reporting and improved security
intelligence, reduce complexity, and lower the cost of maintain-
ing a strong security posture. Other cost-saving and security-
improving capabilities include:
●● ●
External and internal contextual information for breach detec-
tion, prediction and remediation
●● ●
Automated device and software updates for researched
vulnerabilities
●● ●
Linking of authentication and authorization with suspicious
database activity
●● ●
Automated compliance and risk assessment activities
Expertise
With more than 5,500 researchers, developers and subject-
matter experts engaged in security initiatives, IBM operates one
of the world’s broadest enterprise security research and develop-
ment and delivery organization. This comprises the award-
winning IBM X-Force research and development team with one
of the largest vulnerability databases in the industry, nine secu-
rity operations centers, ten IBM Security Research centers,
15 Security Solutions Development Labs and the Institute for
Advanced Security with chapters in the United States, Europe
and Asia Pacific. IBM currently monitors more than 13 billion
security events per day for its clients in more than 130 countries.
IBM operates one of the world’s broadest security research and development and delivery operations.
Security Operations Centers
Costa Mesa, US
Atlanta, US
Atlanta, US
Raleigh, US
Haifa, IL Pune, IN
Bangalore, IN
Bangalore, IN
New Delhi, IN
Perth, AU
Brisbane, AU
Singapore, SG
Taipei, TW
Tokyo, JP
Tokyo, JP
Gold Coast, AU
IAS, Asia Pacific
Brussels, BE
Atlanta, US
Hortolândia, BR
Austin, US
Alamden, US
Boulder, US
Ottawa, CA
Waltham, US Fredericton, CA Belfast, N IR
Zurich, CH
Delft, NL
Herzliya, IL
IAS, Europe
Toronto, CA
TJ Watson, US
Detroit, US
IAS, Americas
Security Research Centers
Security Solution Development Centers
Institute for Advanced Security Branches
5IBM Software
IBM has the consultants and expertise to help any company
move toward optimized, integrated security controls with secu-
rity intelligence.
Product Portfolio
The IBM Security Framework is designed to help ensure that
the correct people have access to the correct resources at the
correct times, that critical data is protected in transit and at rest,
that emerging threats are identified to support breach preven-
tion and remediation, and that protection is provided across all
IT resources. This integrated approach to enterprise security
includes appliances, software products and managed services and
is delivered by technical and risk consulting and implementation
services. At the very core, however, resides the IBM product
portfolio.
Help prevent, detect and remediate security breaches and com-
pliance risks.
Challenge and Solutions Highlights
IBM security intelligence products assist with:
●● ●
Detecting advanced threats: Arm yourself with comprehen-
sive and accurate security intelligence.
●● ●
Addressing compliance: Automate data collection and
reporting for audits and risk assessment.
●● ●
Detecting insider threats and fraud: Identify and under-
stand suspicious user activity in context.
●● ●
Predicting risks to your business: Proactively identify and
prioritize security vulnerabilities and gaps.
●● ●
Consolidating data silos: Collect, correlate and report on
data in one integrated solution.
Products
A family of integrated security intelligence products based on
next-generation security information and event management
(SIEM) and log management includes:
●● ●
IBM Security QRadar® SIEM: Security information and
event management encompassing log management, threat
management and compliance management; sophisticated
event and network flow correlation; and integrated behavioral
analysis and network anomaly detection
●● ●
IBM Security QRadar Log Manager: Turnkey log manage-
ment supporting hundreds of data sources out of the box,
offering pre-packaged reports and dashboards and easy
customization
●● ●
IBM Security QRadar Risk Manager: Security configura-
tion monitoring and auditing; predictive threat modeling and
simulation; and advanced threat visualization and impact
analysis
The IBM Security Framework provides a methodical and efficient approach to
fulfilling security needs and meeting security challenges across the enterprise.
IBM Security Framework
ProfessionalServices
CloudandManagedServices
Software and Appliances
Governance, Risk and Compliance
Security Intelligence
and Analytics
Advanced Security
and Threat Research
Infrastructure
Applications
Data
People
Security Intelligence
and Analytics
360 Degree
View
6 IBM Security Products: Intelligence, Integration, Expertise
●● ●
IBM Security QRadar Network Anomaly Detection:
Anomaly detection of network traffic and real-time correlation
of security and network data, built to enhance IBM Security
SiteProtector™ System
●● ●
IBM Security QRadar QFlow and VFlow Collectors:
Integrated network traffic collection and content capture,
including Layer 7 application analysis, for both physical and
virtual environments
People
Track
Plan
Enforce
Control, monitor and authenticate user access to protected data
and applications.
Challenges and Solutions Highlights
IBM Security identity and access management products
assist with:
●● ●
Managing users and their access rights: Efficiently enroll,
manage and terminate user profiles and access rights through-
out the lifecycle. Flag expired accounts and role conflicts.
●● ●
Streamlining/tracking user access to protected resources:
Integrate lifecycle access rights with single sign-on and pass-
word management, and with access auditing and reports.
Support strong authentication of devices for extra security.
●● ●
Safeguarding access in cloud, mobile and software-as-a-
service environments: Provide a common identity service for
user provisioning, role-based access and federated identity.
Centralize security management for user entitlements and
policies.
Products
Integrated solutions that govern users’ access activities and privi-
leges throughout their lifecycle include:
●● ●
IBM Security Identity Manager: Management of user
accounts, access rights, permissions and passwords from their
creation to termination
●● ●
IBM Federated Identity Manager: User-centric, federated
single sign-on for sharing information between trusted busi-
ness partners and simplifying application integration across
distributed portal and mainframe environments
●● ●
IBM Security Access Manager for Web: Highly scalable
user access management and web application protection to
protect against advanced threats
●● ●
IBM Security Access Manager for Cloud and Mobile:
Extension of user access protection to mobile and cloud
environments using federated single sign-on (SSO), user
authentication and risk scoring
●● ●
IBM Security Access Manager for Enterprise Single
Sign-On: Integrated authentication, access workflow automa-
tion, user switching and audit reporting to help simplify and
strengthen access security
●● ●
IBM Security Identity and Access Assurance: Management
of user accounts, access permissions and passwords with con-
venient single sign-on to enterprise applications and resources
Data
Monitor
Encrypt
Assess
Redact
Help protect critical data assets across key control points without
impacting productivity.
Challenges and Solutions Highlights
IBM data security products assist with:
●● ●
Preventing data breaches: Monitor transactions without
requiring changes to databases or applications. Create realistic
test sets while masking sensitive data value. Encrypt regulated
data to help prevent loss—particularly via theft of backups and
media. Redact standalone or embedded unstructured sensitive
data in forms and documents.
●● ●
Maintaining the integrity of sensitive data: Compare all
transactions to policy and block violations in real time.
●● ●
Reducing the cost of compliance: Automate and centralize
controls to streamline compliance validation.
7IBM Software
Products
IBM InfoSphere® Guardium® offerings designed to help assure
the privacy and integrity of trusted information in your data
center include:
●● ●
IBM InfoSphere Guardium Database Activity
Monitoring: A simple, robust solution that helps prevent
leakage of sensitive data from databases and files, maintaining
the integrity of information in the data center and automating
compliance controls across heterogeneous environments
●● ●
IBM InfoSphere Guardium Vulnerability Assessment:
Automated detection of database vulnerabilities with priori-
tized remedial actions across heterogeneous infrastructures
●● ●
IBM InfoSphere Guardium Data Redaction: Protection
designed to guard against unintentional disclosure for sensitive
data in documents and forms by detecting and removing data
from openly shared document versions
●● ●
IBM InfoSphere Guardium Data Encryption: Enterprise
data encryption without sacrificing application performance or
creating key management complexity
●● ●
IBM InfoSphere Optim™ Data Masking: Capabilities to
de-identify confidential information to help protect privacy
and support compliance initiatives
●● ●
IBM Security Key Lifecycle Manager: Encryption key
lifecycle management with centralized and strengthened
processes that leverage the industry-standard Key
Management Interoperability Protocol
●● ●
IBM InfoSphere Discovery: A tool for identifying and docu-
menting what data you have, where it is located and how it is
linked across systems by intelligently capturing relationships
and determining applied transformations and business rules
Help keep applications secure, protected from malicious or
fraudulent use, and hardened against attacks.
Challenges and Solutions Highlights
IBM application security products assist with:
●● ●
Finding and remediating mobile and web vulnerabilities:
Utilize static, dynamic, runtime and client-side analysis and
correlate the results.
●● ●
Building applications that are secure by design: Integrate
security testing early and throughout the design process.
Enable security and development teams to communicate
effectively.
●● ●
Controlling access to application data: Manage and
enforce fine-grained entitlement and message security policy
management.
Products
A full portfolio of solutions designed to protect your
applications includes:
●● ●
IBM Security AppScan® Standard: Automated web
application security testing for IT security, auditors and pene-
tration testers
●● ●
IBM Security AppScan Enterprise: Enterprise-class applica-
tion security testing and risk management with governance,
collaboration and security intelligence
●● ●
IBM Security AppScan Source: Static application security
testing to identify vulnerabilities in web and mobile applica-
tions during the development lifecycle
●● ●
IBM Security Policy Manager: Capabilities for authoring
application entitlements and fine-grained access control
policies for distributed policy decisions based on identity,
transaction and service/resource context
●● ●
IBM WebSphere® DataPower® XML Security Gateway:
An appliance-based solution providing real-time web services
security and XML threat protectionApplications
Protect
Test
Control
8 IBM Security Products: Intelligence, Integration, Expertise
Help provide security for the entire network infrastructure.
Challenges and Solutions Highlights
IBM network security products assist with:
●● ●
Keeping pace with emerging threats: Provide network
intrusion prevention with evolving threat protection powered
by IBM X-Force research, with its track record of helping to
protect against zero-day vulnerabilities.
●● ●
Balancing security and performance without disrupting
business-critical applications and infrastructures: Get up
to 20+ Gbps of inspected throughput with Network Intrusion
Prevention to address the most demanding service quality
requirements—without compromising breadth and depth of
security.
●● ●
Reducing infrastructure cost and complexity: Consolidate
point solutions and reduce complexity through integration
with other security solutions.
●● ●
Protecting non-network assets quickly when new threats
emerge: Help protect data, client, web and enterprise applica-
tions with the extensible engine within IBM Security Network
Intrusion Prevention System.
Products
IBM offerings for network infrastructure security include:
●● ●
IBM Security Network Protection: Provides core threat
protection combined with innovative capabilities for applica-
tion visibility and control related to help reduce risk and con-
serve bandwidth
●● ●
IBM Security Network Intrusion Prevention System:
Serves as the core of a network intrusion prevention strategy,
providing appliance-based protection against a wide range of
attacks that target the network infrastructure
●● ●
IBM Security SiteProtector System: Offers centralized
management for IBM Security Network Intrusion Prevention
solutions, providing a single management point of control,
including security policy, analysis, alerting and reporting
Infrastructure:
Endpoints
Assess
Remediate
Enforce
Report
Infrastructure:
Network
Pre-emptive
Fast
Extensible
Help secure and manage distributed endpoints.
Challenges and Solutions Highlights
IBM endpoint management and security products assist with:
●● ●
Maintaining continuous compliance for all endpoints,
regardless of their location or connection: Deploy an intel-
ligent agent to monitor and report on compliance status and
automatically take corrective action when needed.
●● ●
Achieving high patch compliance in a heterogeneous
environment: Provide patching capabilities for Microsoft
Windows, UNIX, Linux and Mac environments, and for
mobile devices, from a single management console and a
single management server.
●● ●
Protecting endpoints with rapid response: Automatically
identify rogue or misconfigured endpoints and identify/
remediate/quarantine endpoints experiencing an incident in
minutes.
●● ●
Streamlining compliance and risk management efforts:
Achieve automated and robust audit and compliance reporting
with deep, proactive auditing of security configurations.
●● ●
Securing virtualized endpoints: Get a single, centralized
security view of physical and virtual server environments with
automatic protection for virtual machines as they come online
or move.
Products
IBM offerings that help protect distributed endpoints include:
●● ●
IBM Endpoint Manager: Endpoint and security manage-
ment combined into a single solution that enables visibility
into and control of physical and virtual endpoints; rapid
remediation, protection and reporting on endpoints in real
time; and automation of time-intensive tasks across complex
networks to help control costs while helping reduce risk and
support compliance
9IBM Software
●● ●
IBM Security Virtual Server Protection for VMware:
Protection for every layer of the virtual infrastructure with
defense-in-depth, dynamic security with virtual machine root-
kit detection, virtual infrastructure auditing and monitoring of
network traffic through hypervisor integration
●● ●
IBM Security Host Protection: Protection designed to
guard against both internal and external threats for network
assets including servers and desktops
Leverage the mainframe as the enterprise security hub to help
protect mission-critical production systems and data.
Challenges and Solutions Highlights
IBM mainframe security products assist with:
●● ●
Verifying compliance manually, with alerts only after a
problem occurs: Get real-time alerts on external threats,
inappropriate data access or misconfiguration with automated
compliance monitoring. Help prevent privileged-user abuse
by blocking IBM Resource Access Control Facility (RACF®)
commands in real time.
●● ●
Coping with the complexity of identifying and analyzing
threats in mainframe environments: Automatically analyze
and report on mainframe security events and detect exposures.
Monitor intruders. Identify misconfigurations.
●● ●
Maintaining a highly skilled IT staff to provide manual
mainframe security: Simplify administration with a
Windows-based graphical user interface (GUI) for RACF
administration.
Products
The IBM Security zSecure™ Suite, designed to provide
infrastructure mainframe security, includes:
●● ●
IBM Security zSecure Admin: Efficient and effective RACF
administration using significantly fewer resources
Infrastructure:
Mainframe
Compliance
Administration
Advanced Security and
Threat Research
●● ●
IBM Security zSecure Visual: Helping reduce the need for
scarce, RACF-trained expertise through a Windows-based
GUI for RACF administration
●● ●
IBM Security zSecure CICS® Toolkit: Mainframe admin-
istration from an IBM Customer Information Control System
(CICS) environment, freeing up native-RACF resources
●● ●
IBM Security zSecure Audit: Automatic analysis of and
reporting on security events and detection of security
exposures
●● ●
IBM Security zSecure Alert: Real-time mainframe threat
monitoring to monitor intruders and identify misconfigura-
tions that could hamper compliance efforts
●● ●
IBM Security zSecure Command Verifier: Policy enforce-
ment to support compliance with company and regulatory
policies by preventing erroneous commands
●● ●
IBM Security zSecure Manager for RACF z/VM®: A
user-friendly layer added to the mainframe that enables supe-
rior administration coupled with audit capabilities for z/VM
RACF and Linux on IBM System z®
The world-renowned IBM X-Force research and development
team provides the foundation for the IBM preemptive approach
to Internet security. This group of security experts focuses on
researching and evaluating vulnerabilities and security issues,
developing assessments and countermeasure technology for
IBM products (updated in real-time via the X-Force threat
intelligence feed) and educating the public about emerging
Internet threats and trends.
IBM X-Force research and development is instrumental in
helping protect IBM customers against threats. The X-Force
vulnerability database contains more than 63,000 documented
vulnerabilities, with detailed analysis of every notable public vul-
nerability disclosure since 1994. The IBM X-Force Trend and
Risk Report, published bi-annually, is one of the oldest and most
comprehensive security research reports of its kind. It dives
deeply into security challenges, including threats, operational
and development practices, and emerging trends.
10 IBM Security Products: Intelligence, Integration, Expertise
Solutions for Today’s Challenges
The IBM Security Framework of integrated products and
services, built to deliver security intelligence, can be used to help
secure today’s and tomorrow’s enterprise platforms against
known and unknown threats. Today, the biggest security trends
and challenges are: Mobile Security, Cloud Security, Big Data
Security and Advanced Threats.
Mobile Security
The mobile device and tablet is rapidly becoming the primary
productivity tool for business and its employees, providing flexi-
ble access to information anytime, anywhere. Unprotected end-
point devices are like open doors into sensitive information.
Organizations should guard the data on those devices—whether
the data is at rest or in motion over unsecured networks
and infrastructure. IBM helps organizations embrace both
company- and employee-owned mobile devices in a security-rich
environment with capabilities including:
●● ●
Device Security and Management: Helping protect the data
and the device
●● ●
Secure Access: Helping guard enterprise resources, data and
applications
●● ●
Application Security: Helping ensure safety for the design,
development, testing, delivery, use and management of mobile
applications
●● ●
Security Intelligence: Delivering enterprise visibility and an
adaptive mobile security posture
Highlighted Specific Offerings:
●● ●
IBM Security AppScan Source: Helps detect vulnerabilities
in mobile web applications
●● ●
IBM Security Access Manager for Cloud and Mobile:
Extends user access protection to mobile and cloud environ-
ments using federated SSO, user authentication and risk
scoring
●● ●
IBM Endpoint Manager for Mobile Devices: Enforces
device security configuration and enterprise management
control
Cloud Security
Organizations are looking for cloud security solutions that pro-
vide visibility, control, isolation and automation across multiple
cloud infrastructures. Security solutions from IBM help create a
cloud infrastructure that drives down costs and is just as dynamic
as today’s business climate requires. IT departments can reduce
and manage risks associated with cloud computing by:
●● ●
Managing identities and single sign-on access across multiple
cloud services
●● ●
Monitoring access to shared databases
●● ●
Scanning cloud-deployed web applications for the latest
vulnerabilities
●● ●
Helping defend cloud users and workloads from sophisticated
network attacks
●● ●
Monitoring cloud-based and traditional resources with a
single, unified approach
●● ●
Providing endpoint and patch management of virtualized
machines for security compliance
●● ●
Increasing the visibility and auditing of cloud activity within
multi-tenant environments
Highlighted Specific Offerings:
●● ●
IBM Security Virtual Server Protection for VMware:
Threat protection for every layer of the virtual infrastructure
●● ●
IBM Tivoli® Federated Identity Manager: Authentication
to multiple cloud applications, inside and outside the enter-
prise, via a single identity
●● ●
IBM Endpoint Manager: Efficient security and compliance
for distributed cloud virtual platforms
Big Data Security
The explosion of enterprise data is both a significant challenge
to manage and a significant opportunity to leverage for security
insight. IBM solutions extract insight from an immense amount
of real-time and historical data—in context and beyond what was
11IBM Software
previously possible. Data is the new currency of business.
IBM can help protect this valuable asset and strengthen enter-
prise security by:
●● ●
Correlating large amounts of security-relevant data (for
example, logs and network flows) from across silos, using
integrated and intelligent security analytics to better predict
and detect risks to the business
●● ●
Helping reduce operational risk from threats facing structured
(databases) and unstructured (documents) data to help prevent
data loss and unauthorized access
Highlighted Specific Offerings
●● ●
IBM Security QRadar: Integrated, automated security intel-
ligence and analytics for the entire enterprise
●● ●
IBM InfoSphere Guardium: Real-time database security
and monitoring, fine-grained database auditing, automated
compliance reporting
Advanced Threats
Organizations face increasing complexity in defending them-
selves from skilled and determined adversaries. These attackers
can target critical IT assets and public infrastructure using both
sophisticated and off-the-shelf techniques to gain access.
The challenge: no one solution is enough. Organizations must
go beyond traditional patch-monitor-remediate processes and
employ both continuous monitoring and layers of defense capa-
ble of working in concert with one another to identify, analyze
and respond to targeted threats. IBM helps protect against
advanced threats by:
●● ●
Helping identify and defend against known and unknown
attacks by combining network security, worldwide threat intel-
ligence and advanced security analytics
Highlighted Specific Offering
●● ●
IBM Advanced Threat Protection Platform: Including
IBM Security Network Intrusion Prevention System,
IBM Security SiteProtector System, IBM Security QRadar
Network Anomaly Detection and IBM Security X-Force
Threat Insight
– Injects X-Force intelligence into QRadar to help identify
threats associated with malicious IP addresses
– Helps protect against network-based threats masked in
common network traffic and helps prevent attackers from
exploiting vulnerabilities at the network, host and applica-
tion layers
Gartner rates IBM Security in the Leaders Quadrant Magic Quadrant for Static Application Security Testing, by Joseph
Feiman, Neil MacDonald, December 12, 2010
Magic Quadrant for Enterprise Governance, Risk and Compliance
Platforms, by French Caldwell, John Wheeler, October 4, 2012 Magic Quadrant for Dynamic Application Security Testing, by Joseph
Feiman, Neil MacDonald, December 17, 2011
Magic Quadrant for User Administration/Provisioning, by Earl Perkins,
Perry Carpenter, December 22, 2011 Magic Quadrant for Security Information & Event Management, by
Mark Nicolett, Kelly Kavanagh, May 24, 2012
Please Recycle
Conclusion
In a world of big data, where information is the lifeblood of
business and persistent attacks on enterprise data and IT assets
have eroded the effectiveness of traditional IT defenses, a funda-
mentally new approach to security is needed. Such an approach
must be based on three main tenets—Intelligence, Integration
and Expertise—delivering the infrastructure visibility, cross-
organizational linkages and optimized controls necessary not
only to help protect business-critical data but also to support
compliance activities. The IBM Security Framework delivers a
unified approach to enterprise security that manages key func-
tions ranging from threat detection to user access, compliance
cost reduction and configuration management—and much
more—all with a foundation in world-renowned research and
development to help reduce the risk of today’s advanced threats.
For more information
To learn more about IBM Security, please contact your
IBM representative or IBM Business Partner, or visit:
ibm.com/security
To join the Institute for Advanced Security, please visit:
www.instituteforadvancedsecurity.com
Additionally, IBM Global Financing can help you acquire
the software capabilities that your business needs in the most
cost-effective and strategic way possible. We’ll partner with
credit-qualified clients to customize a financing solution to
suit your business and development goals, enable effective cash
management, and improve your total cost of ownership. Fund
your critical IT investment and propel your business forward
with IBM Global Financing. For more information, visit:
ibm.com/financing
© Copyright IBM Corporation 2013
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
February 2013
IBM, the IBM logo, ibm.com, Tivoli, WebSphere, AppScan, Guardium,
InfoSphere, RACF, and X-Force are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other
product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the web at “Copyright and
trademark information” at ibm.com/legal/copytrade.shtml
Linux is a registered trademark of Linus Torvalds in the United States, other
countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the
United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States
and other countries.
This document is current as of the initial date of publication and may be
changed by IBM at any time. Not all offerings are available in every country
in which IBM operates.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED
“AS IS” WITHOUT ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING WITHOUT ANY WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the
terms and conditions of the agreements under which they are provided.
Statement of Good Security Practices: IT system security involves protecting
systems and information through prevention, detection and response to
improper access from within and outside your enterprise. Improper access
can result in information being altered, destroyed or misappropriated or
can result in damage to or misuse of your systems, including to attack others.
No IT system or product should be considered completely secure and no
single product or security measure can be completely effective in preventing
improper access. IBM systems and products are designed to be part of a
comprehensive security approach, which will necessarily involve additional
operational procedures, and may require other systems, products or services
to be most effective. IBM does not warrant that systems and products are
immune from the malicious or illegal conduct of any party.
WGB03004-USEN-00

Contenu connexe

Tendances

Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 

Tendances (20)

IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 

En vedette

Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
 

En vedette (16)

Ibm portfolio piece
Ibm portfolio pieceIbm portfolio piece
Ibm portfolio piece
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attack
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
The API Economy (with speaker notes)
The API Economy (with speaker notes)The API Economy (with speaker notes)
The API Economy (with speaker notes)
 

Similaire à Ibm security products portfolio

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similaire à Ibm security products portfolio (20)

IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
IBM X-Force Research
IBM X-Force ResearchIBM X-Force Research
IBM X-Force Research
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 

Plus de Patrick Bouillaud

Plus de Patrick Bouillaud (20)

8. myprm comment vendre en interne votre projet de prm
8. myprm   comment vendre en interne votre projet de prm 8. myprm   comment vendre en interne votre projet de prm
8. myprm comment vendre en interne votre projet de prm
 
Livre blanc la vente indirecte c'est quoi
Livre blanc   la vente indirecte c'est quoiLivre blanc   la vente indirecte c'est quoi
Livre blanc la vente indirecte c'est quoi
 
Livre blanc un PRM, c'est quoi
Livre blanc un PRM, c'est quoiLivre blanc un PRM, c'est quoi
Livre blanc un PRM, c'est quoi
 
Forrester wave q4 2018
Forrester wave q4 2018Forrester wave q4 2018
Forrester wave q4 2018
 
Myprm solution 2018 v1
Myprm solution 2018 v1Myprm solution 2018 v1
Myprm solution 2018 v1
 
IBM Services Platform with Watson
IBM Services Platform with WatsonIBM Services Platform with Watson
IBM Services Platform with Watson
 
Protection des données personnelles Se mettre en conformité : Pourquoi ? Comm...
Protection des données personnelles Se mettre en conformité : Pourquoi ? Comm...Protection des données personnelles Se mettre en conformité : Pourquoi ? Comm...
Protection des données personnelles Se mettre en conformité : Pourquoi ? Comm...
 
Api pour les nuls
Api pour les nulsApi pour les nuls
Api pour les nuls
 
IBM #Softlayer infographic 2016
IBM #Softlayer infographic 2016IBM #Softlayer infographic 2016
IBM #Softlayer infographic 2016
 
Hybrid Cloud Pour Dummies
Hybrid Cloud Pour DummiesHybrid Cloud Pour Dummies
Hybrid Cloud Pour Dummies
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Ibm api economie
Ibm api economieIbm api economie
Ibm api economie
 
Les serveurs Power8 , la performance assurée .Propositions de valeur
Les serveurs Power8 , la performance assurée .Propositions de valeur Les serveurs Power8 , la performance assurée .Propositions de valeur
Les serveurs Power8 , la performance assurée .Propositions de valeur
 
Api for dummies
Api for dummies  Api for dummies
Api for dummies
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic Storage
 
IBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack OverviewIBM Cloud Manager with OpenStack Overview
IBM Cloud Manager with OpenStack Overview
 
Big Data Analytics Infrastructure for Dummies
Big Data Analytics Infrastructure for DummiesBig Data Analytics Infrastructure for Dummies
Big Data Analytics Infrastructure for Dummies
 
What is IBM Bluemix , Une nouvelle façon de coder , dans le cloud
What is IBM Bluemix , Une nouvelle façon de coder , dans le cloudWhat is IBM Bluemix , Une nouvelle façon de coder , dans le cloud
What is IBM Bluemix , Une nouvelle façon de coder , dans le cloud
 
#Cloudaccelerate présentation IDC , Le Marche francais Cloud et MSP
#Cloudaccelerate présentation IDC , Le Marche francais Cloud et MSP#Cloudaccelerate présentation IDC , Le Marche francais Cloud et MSP
#Cloudaccelerate présentation IDC , Le Marche francais Cloud et MSP
 

Dernier

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
anilsa9823
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 

Dernier (20)

Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 

Ibm security products portfolio

  • 1. IBM Software IBM Security Products: Intelligence, Integration, Expertise A Comprehensive Framework for Any Environment from Mobile to Cloud to Social to Unknown Futures
  • 2. 2 IBM Security Products: Intelligence, Integration, Expertise Contents 2 A Hyper-Connected Business World 3 Security Intelligence for a New World 3 A Unique, Comprehensive Approach 5 Product Portfolio 10 Solutions for Today’s Challenges 12 Conclusion 12 For more Information Labeled “The Year of the Security Breach” by the IBM X-Force research and development team, 2011 was marked by a high volume of severe and varied security attacks. Attack Type 2011 Sampling of Security Incidents by Attack Type, Time and Impact conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses SQL Injection URL Tampering Spear Phishing 3rd Party Software DDoS SecureID Trojan Software Unknown Gaming Defense Entertainment Banking Central Government Entertainment National Police Central Government Entertainment Central Government Central Government Central Government Central Government Entertainment Central Government Entertainment Defense Defense IT Security IT Security IT Security Consulting Banking Consumer Electronics Marketing Services National Police State Police Gaming Consumer Electronics State Police National Police Consumer Electronics Central Government Central Government Central Government Central Government Gaming Consulting Defense Financial Market Agriculture Tele- communications Internet Services Consumer Electronics Heavy Industry Insurance Internet Services Apparel Gaming Central Government Gaming Gaming Gaming Gaming Gaming Gaming Government Consulting Online Services Online Services Size of circle estimates relative impact of breach in terms of cost to business Jan Feb March April May June July Aug Sep Oct Nov Dec A Hyper-Connected Business World In today’s hyper-connected business world, a fundamentally different approach is needed to secure the enterprise. The explosion of digital business information that is accessed from and stored on virtualized cloud and social platforms, instrumen- tation, and mobile devices that are part consumer part business, have created an overwhelmingly complex IT environment— with possible attack points nearly limitless. The most sophisticated adversaries are now perpetrating Advanced Persistent Threats, using focus and persistence to gain access to sensitive business information. These attacks uti- lize cutting-edge methodologies, can last indefinitely and are specifically targeted. The increased diversity of today’s threats has eroded the effectiveness of traditional IT defenses such as firewalls and antivirus—even bypassing these controls com- pletely in many cases. A new approach is required, one that bal- ances protection with detection, and advanced technology with mature processes.
  • 3. 3IBM Software Security Intelligence for a New World Only those companies that have deployed solutions to monitor, correlate and analyze the massive amounts of real-time events being generated from a comprehensive, integrated security infrastructure as well as from a well-researched external threat feed have the capability to cost-effectively maintain an extremely strong security posture. IBM calls this security intelligence. In addition to helping detect and remediate breaches that might otherwise have been missed, this approach can enable organizations to: ●● ● Shift from a reactive state to a proactive approach that better aligns with business objectives ●● ● Enable their business to deploy innovation initiatives far faster than otherwise possible ●● ● Automate their compliance activities ●● ● Reduce staff requirements for security operations A Unique, Comprehensive Approach With leading products and services across segments and an over- arching strategy based on three main tenets—Intelligence, Integration and Expertise—IBM is helping its customers work toward true security intelligence. Intelligence Human intelligence requires knowledge, information and the ability to analyze this information to reach conclusions. In the realm of enterprise security, this translates to needing visibility into relevant networks and infrastructures and external threat Moving from a reactive and manual approach to a proactive and automated approach gives the organization an optimized security posture based in security intelligence. Security Intelligence Reactive ProactiveManualAutomated O ptim ized Proficient Basic The integration of security intelligence, X-Force research and core protection assets helps close the coverage gaps left by point product approaches. Integrated Intelligence. Integrated Research. Integrated Protection. Security Intelligence People A pplications Advanced Research In frastructure Data Security Intelligence People A pplications Advanced Research I nfrastructure Data Security Intelligence People Applications Advanced Research I nfrastructure Data 3rd Party Ecosystem
  • 4. 4 IBM Security Products: Intelligence, Integration, Expertise intelligence, plus the real-time correlation and analytics capabili- ties to flag and remediate suspicious activities. IBM Security offers these capabilities: ●● ● Internal visibility: IBM security intelligence solutions analyze information from IBM and non-IBM products and services in real-time. They provide comprehensive analysis and insight across all four areas of security risk: people, data, applications and infrastructure. ●● ● External threat visibility: The IBM® X-Force® threat intel- ligence feed provides critical information from one of the world’s largest repositories of threat and vulnerability insights and is based on the real-time monitoring of 13 billion security events per day. This insight can flag behavior that may be associated with Advanced Persistent Threats and a wide range of adversaries. ●● ● Pinpoint analysis in an age of big data: IBM security intelli- gence solutions can drill down to individual data elements to analyze and query diverse activity. They provide insight on network access at the periphery, external cloud services and mobile devices, database activity at the core of a business, and everywhere in between. Integration The integration of the comprehensive IBM portfolio of security intelligence, X-Force research and core protection assets helps reduce attackable weaknesses that arise from patched-together security point products. It can also ease deployment, collapse data silos for easier compliance reporting and improved security intelligence, reduce complexity, and lower the cost of maintain- ing a strong security posture. Other cost-saving and security- improving capabilities include: ●● ● External and internal contextual information for breach detec- tion, prediction and remediation ●● ● Automated device and software updates for researched vulnerabilities ●● ● Linking of authentication and authorization with suspicious database activity ●● ● Automated compliance and risk assessment activities Expertise With more than 5,500 researchers, developers and subject- matter experts engaged in security initiatives, IBM operates one of the world’s broadest enterprise security research and develop- ment and delivery organization. This comprises the award- winning IBM X-Force research and development team with one of the largest vulnerability databases in the industry, nine secu- rity operations centers, ten IBM Security Research centers, 15 Security Solutions Development Labs and the Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM currently monitors more than 13 billion security events per day for its clients in more than 130 countries. IBM operates one of the world’s broadest security research and development and delivery operations. Security Operations Centers Costa Mesa, US Atlanta, US Atlanta, US Raleigh, US Haifa, IL Pune, IN Bangalore, IN Bangalore, IN New Delhi, IN Perth, AU Brisbane, AU Singapore, SG Taipei, TW Tokyo, JP Tokyo, JP Gold Coast, AU IAS, Asia Pacific Brussels, BE Atlanta, US Hortolândia, BR Austin, US Alamden, US Boulder, US Ottawa, CA Waltham, US Fredericton, CA Belfast, N IR Zurich, CH Delft, NL Herzliya, IL IAS, Europe Toronto, CA TJ Watson, US Detroit, US IAS, Americas Security Research Centers Security Solution Development Centers Institute for Advanced Security Branches
  • 5. 5IBM Software IBM has the consultants and expertise to help any company move toward optimized, integrated security controls with secu- rity intelligence. Product Portfolio The IBM Security Framework is designed to help ensure that the correct people have access to the correct resources at the correct times, that critical data is protected in transit and at rest, that emerging threats are identified to support breach preven- tion and remediation, and that protection is provided across all IT resources. This integrated approach to enterprise security includes appliances, software products and managed services and is delivered by technical and risk consulting and implementation services. At the very core, however, resides the IBM product portfolio. Help prevent, detect and remediate security breaches and com- pliance risks. Challenge and Solutions Highlights IBM security intelligence products assist with: ●● ● Detecting advanced threats: Arm yourself with comprehen- sive and accurate security intelligence. ●● ● Addressing compliance: Automate data collection and reporting for audits and risk assessment. ●● ● Detecting insider threats and fraud: Identify and under- stand suspicious user activity in context. ●● ● Predicting risks to your business: Proactively identify and prioritize security vulnerabilities and gaps. ●● ● Consolidating data silos: Collect, correlate and report on data in one integrated solution. Products A family of integrated security intelligence products based on next-generation security information and event management (SIEM) and log management includes: ●● ● IBM Security QRadar® SIEM: Security information and event management encompassing log management, threat management and compliance management; sophisticated event and network flow correlation; and integrated behavioral analysis and network anomaly detection ●● ● IBM Security QRadar Log Manager: Turnkey log manage- ment supporting hundreds of data sources out of the box, offering pre-packaged reports and dashboards and easy customization ●● ● IBM Security QRadar Risk Manager: Security configura- tion monitoring and auditing; predictive threat modeling and simulation; and advanced threat visualization and impact analysis The IBM Security Framework provides a methodical and efficient approach to fulfilling security needs and meeting security challenges across the enterprise. IBM Security Framework ProfessionalServices CloudandManagedServices Software and Appliances Governance, Risk and Compliance Security Intelligence and Analytics Advanced Security and Threat Research Infrastructure Applications Data People Security Intelligence and Analytics 360 Degree View
  • 6. 6 IBM Security Products: Intelligence, Integration, Expertise ●● ● IBM Security QRadar Network Anomaly Detection: Anomaly detection of network traffic and real-time correlation of security and network data, built to enhance IBM Security SiteProtector™ System ●● ● IBM Security QRadar QFlow and VFlow Collectors: Integrated network traffic collection and content capture, including Layer 7 application analysis, for both physical and virtual environments People Track Plan Enforce Control, monitor and authenticate user access to protected data and applications. Challenges and Solutions Highlights IBM Security identity and access management products assist with: ●● ● Managing users and their access rights: Efficiently enroll, manage and terminate user profiles and access rights through- out the lifecycle. Flag expired accounts and role conflicts. ●● ● Streamlining/tracking user access to protected resources: Integrate lifecycle access rights with single sign-on and pass- word management, and with access auditing and reports. Support strong authentication of devices for extra security. ●● ● Safeguarding access in cloud, mobile and software-as-a- service environments: Provide a common identity service for user provisioning, role-based access and federated identity. Centralize security management for user entitlements and policies. Products Integrated solutions that govern users’ access activities and privi- leges throughout their lifecycle include: ●● ● IBM Security Identity Manager: Management of user accounts, access rights, permissions and passwords from their creation to termination ●● ● IBM Federated Identity Manager: User-centric, federated single sign-on for sharing information between trusted busi- ness partners and simplifying application integration across distributed portal and mainframe environments ●● ● IBM Security Access Manager for Web: Highly scalable user access management and web application protection to protect against advanced threats ●● ● IBM Security Access Manager for Cloud and Mobile: Extension of user access protection to mobile and cloud environments using federated single sign-on (SSO), user authentication and risk scoring ●● ● IBM Security Access Manager for Enterprise Single Sign-On: Integrated authentication, access workflow automa- tion, user switching and audit reporting to help simplify and strengthen access security ●● ● IBM Security Identity and Access Assurance: Management of user accounts, access permissions and passwords with con- venient single sign-on to enterprise applications and resources Data Monitor Encrypt Assess Redact Help protect critical data assets across key control points without impacting productivity. Challenges and Solutions Highlights IBM data security products assist with: ●● ● Preventing data breaches: Monitor transactions without requiring changes to databases or applications. Create realistic test sets while masking sensitive data value. Encrypt regulated data to help prevent loss—particularly via theft of backups and media. Redact standalone or embedded unstructured sensitive data in forms and documents. ●● ● Maintaining the integrity of sensitive data: Compare all transactions to policy and block violations in real time. ●● ● Reducing the cost of compliance: Automate and centralize controls to streamline compliance validation.
  • 7. 7IBM Software Products IBM InfoSphere® Guardium® offerings designed to help assure the privacy and integrity of trusted information in your data center include: ●● ● IBM InfoSphere Guardium Database Activity Monitoring: A simple, robust solution that helps prevent leakage of sensitive data from databases and files, maintaining the integrity of information in the data center and automating compliance controls across heterogeneous environments ●● ● IBM InfoSphere Guardium Vulnerability Assessment: Automated detection of database vulnerabilities with priori- tized remedial actions across heterogeneous infrastructures ●● ● IBM InfoSphere Guardium Data Redaction: Protection designed to guard against unintentional disclosure for sensitive data in documents and forms by detecting and removing data from openly shared document versions ●● ● IBM InfoSphere Guardium Data Encryption: Enterprise data encryption without sacrificing application performance or creating key management complexity ●● ● IBM InfoSphere Optim™ Data Masking: Capabilities to de-identify confidential information to help protect privacy and support compliance initiatives ●● ● IBM Security Key Lifecycle Manager: Encryption key lifecycle management with centralized and strengthened processes that leverage the industry-standard Key Management Interoperability Protocol ●● ● IBM InfoSphere Discovery: A tool for identifying and docu- menting what data you have, where it is located and how it is linked across systems by intelligently capturing relationships and determining applied transformations and business rules Help keep applications secure, protected from malicious or fraudulent use, and hardened against attacks. Challenges and Solutions Highlights IBM application security products assist with: ●● ● Finding and remediating mobile and web vulnerabilities: Utilize static, dynamic, runtime and client-side analysis and correlate the results. ●● ● Building applications that are secure by design: Integrate security testing early and throughout the design process. Enable security and development teams to communicate effectively. ●● ● Controlling access to application data: Manage and enforce fine-grained entitlement and message security policy management. Products A full portfolio of solutions designed to protect your applications includes: ●● ● IBM Security AppScan® Standard: Automated web application security testing for IT security, auditors and pene- tration testers ●● ● IBM Security AppScan Enterprise: Enterprise-class applica- tion security testing and risk management with governance, collaboration and security intelligence ●● ● IBM Security AppScan Source: Static application security testing to identify vulnerabilities in web and mobile applica- tions during the development lifecycle ●● ● IBM Security Policy Manager: Capabilities for authoring application entitlements and fine-grained access control policies for distributed policy decisions based on identity, transaction and service/resource context ●● ● IBM WebSphere® DataPower® XML Security Gateway: An appliance-based solution providing real-time web services security and XML threat protectionApplications Protect Test Control
  • 8. 8 IBM Security Products: Intelligence, Integration, Expertise Help provide security for the entire network infrastructure. Challenges and Solutions Highlights IBM network security products assist with: ●● ● Keeping pace with emerging threats: Provide network intrusion prevention with evolving threat protection powered by IBM X-Force research, with its track record of helping to protect against zero-day vulnerabilities. ●● ● Balancing security and performance without disrupting business-critical applications and infrastructures: Get up to 20+ Gbps of inspected throughput with Network Intrusion Prevention to address the most demanding service quality requirements—without compromising breadth and depth of security. ●● ● Reducing infrastructure cost and complexity: Consolidate point solutions and reduce complexity through integration with other security solutions. ●● ● Protecting non-network assets quickly when new threats emerge: Help protect data, client, web and enterprise applica- tions with the extensible engine within IBM Security Network Intrusion Prevention System. Products IBM offerings for network infrastructure security include: ●● ● IBM Security Network Protection: Provides core threat protection combined with innovative capabilities for applica- tion visibility and control related to help reduce risk and con- serve bandwidth ●● ● IBM Security Network Intrusion Prevention System: Serves as the core of a network intrusion prevention strategy, providing appliance-based protection against a wide range of attacks that target the network infrastructure ●● ● IBM Security SiteProtector System: Offers centralized management for IBM Security Network Intrusion Prevention solutions, providing a single management point of control, including security policy, analysis, alerting and reporting Infrastructure: Endpoints Assess Remediate Enforce Report Infrastructure: Network Pre-emptive Fast Extensible Help secure and manage distributed endpoints. Challenges and Solutions Highlights IBM endpoint management and security products assist with: ●● ● Maintaining continuous compliance for all endpoints, regardless of their location or connection: Deploy an intel- ligent agent to monitor and report on compliance status and automatically take corrective action when needed. ●● ● Achieving high patch compliance in a heterogeneous environment: Provide patching capabilities for Microsoft Windows, UNIX, Linux and Mac environments, and for mobile devices, from a single management console and a single management server. ●● ● Protecting endpoints with rapid response: Automatically identify rogue or misconfigured endpoints and identify/ remediate/quarantine endpoints experiencing an incident in minutes. ●● ● Streamlining compliance and risk management efforts: Achieve automated and robust audit and compliance reporting with deep, proactive auditing of security configurations. ●● ● Securing virtualized endpoints: Get a single, centralized security view of physical and virtual server environments with automatic protection for virtual machines as they come online or move. Products IBM offerings that help protect distributed endpoints include: ●● ● IBM Endpoint Manager: Endpoint and security manage- ment combined into a single solution that enables visibility into and control of physical and virtual endpoints; rapid remediation, protection and reporting on endpoints in real time; and automation of time-intensive tasks across complex networks to help control costs while helping reduce risk and support compliance
  • 9. 9IBM Software ●● ● IBM Security Virtual Server Protection for VMware: Protection for every layer of the virtual infrastructure with defense-in-depth, dynamic security with virtual machine root- kit detection, virtual infrastructure auditing and monitoring of network traffic through hypervisor integration ●● ● IBM Security Host Protection: Protection designed to guard against both internal and external threats for network assets including servers and desktops Leverage the mainframe as the enterprise security hub to help protect mission-critical production systems and data. Challenges and Solutions Highlights IBM mainframe security products assist with: ●● ● Verifying compliance manually, with alerts only after a problem occurs: Get real-time alerts on external threats, inappropriate data access or misconfiguration with automated compliance monitoring. Help prevent privileged-user abuse by blocking IBM Resource Access Control Facility (RACF®) commands in real time. ●● ● Coping with the complexity of identifying and analyzing threats in mainframe environments: Automatically analyze and report on mainframe security events and detect exposures. Monitor intruders. Identify misconfigurations. ●● ● Maintaining a highly skilled IT staff to provide manual mainframe security: Simplify administration with a Windows-based graphical user interface (GUI) for RACF administration. Products The IBM Security zSecure™ Suite, designed to provide infrastructure mainframe security, includes: ●● ● IBM Security zSecure Admin: Efficient and effective RACF administration using significantly fewer resources Infrastructure: Mainframe Compliance Administration Advanced Security and Threat Research ●● ● IBM Security zSecure Visual: Helping reduce the need for scarce, RACF-trained expertise through a Windows-based GUI for RACF administration ●● ● IBM Security zSecure CICS® Toolkit: Mainframe admin- istration from an IBM Customer Information Control System (CICS) environment, freeing up native-RACF resources ●● ● IBM Security zSecure Audit: Automatic analysis of and reporting on security events and detection of security exposures ●● ● IBM Security zSecure Alert: Real-time mainframe threat monitoring to monitor intruders and identify misconfigura- tions that could hamper compliance efforts ●● ● IBM Security zSecure Command Verifier: Policy enforce- ment to support compliance with company and regulatory policies by preventing erroneous commands ●● ● IBM Security zSecure Manager for RACF z/VM®: A user-friendly layer added to the mainframe that enables supe- rior administration coupled with audit capabilities for z/VM RACF and Linux on IBM System z® The world-renowned IBM X-Force research and development team provides the foundation for the IBM preemptive approach to Internet security. This group of security experts focuses on researching and evaluating vulnerabilities and security issues, developing assessments and countermeasure technology for IBM products (updated in real-time via the X-Force threat intelligence feed) and educating the public about emerging Internet threats and trends. IBM X-Force research and development is instrumental in helping protect IBM customers against threats. The X-Force vulnerability database contains more than 63,000 documented vulnerabilities, with detailed analysis of every notable public vul- nerability disclosure since 1994. The IBM X-Force Trend and Risk Report, published bi-annually, is one of the oldest and most comprehensive security research reports of its kind. It dives deeply into security challenges, including threats, operational and development practices, and emerging trends.
  • 10. 10 IBM Security Products: Intelligence, Integration, Expertise Solutions for Today’s Challenges The IBM Security Framework of integrated products and services, built to deliver security intelligence, can be used to help secure today’s and tomorrow’s enterprise platforms against known and unknown threats. Today, the biggest security trends and challenges are: Mobile Security, Cloud Security, Big Data Security and Advanced Threats. Mobile Security The mobile device and tablet is rapidly becoming the primary productivity tool for business and its employees, providing flexi- ble access to information anytime, anywhere. Unprotected end- point devices are like open doors into sensitive information. Organizations should guard the data on those devices—whether the data is at rest or in motion over unsecured networks and infrastructure. IBM helps organizations embrace both company- and employee-owned mobile devices in a security-rich environment with capabilities including: ●● ● Device Security and Management: Helping protect the data and the device ●● ● Secure Access: Helping guard enterprise resources, data and applications ●● ● Application Security: Helping ensure safety for the design, development, testing, delivery, use and management of mobile applications ●● ● Security Intelligence: Delivering enterprise visibility and an adaptive mobile security posture Highlighted Specific Offerings: ●● ● IBM Security AppScan Source: Helps detect vulnerabilities in mobile web applications ●● ● IBM Security Access Manager for Cloud and Mobile: Extends user access protection to mobile and cloud environ- ments using federated SSO, user authentication and risk scoring ●● ● IBM Endpoint Manager for Mobile Devices: Enforces device security configuration and enterprise management control Cloud Security Organizations are looking for cloud security solutions that pro- vide visibility, control, isolation and automation across multiple cloud infrastructures. Security solutions from IBM help create a cloud infrastructure that drives down costs and is just as dynamic as today’s business climate requires. IT departments can reduce and manage risks associated with cloud computing by: ●● ● Managing identities and single sign-on access across multiple cloud services ●● ● Monitoring access to shared databases ●● ● Scanning cloud-deployed web applications for the latest vulnerabilities ●● ● Helping defend cloud users and workloads from sophisticated network attacks ●● ● Monitoring cloud-based and traditional resources with a single, unified approach ●● ● Providing endpoint and patch management of virtualized machines for security compliance ●● ● Increasing the visibility and auditing of cloud activity within multi-tenant environments Highlighted Specific Offerings: ●● ● IBM Security Virtual Server Protection for VMware: Threat protection for every layer of the virtual infrastructure ●● ● IBM Tivoli® Federated Identity Manager: Authentication to multiple cloud applications, inside and outside the enter- prise, via a single identity ●● ● IBM Endpoint Manager: Efficient security and compliance for distributed cloud virtual platforms Big Data Security The explosion of enterprise data is both a significant challenge to manage and a significant opportunity to leverage for security insight. IBM solutions extract insight from an immense amount of real-time and historical data—in context and beyond what was
  • 11. 11IBM Software previously possible. Data is the new currency of business. IBM can help protect this valuable asset and strengthen enter- prise security by: ●● ● Correlating large amounts of security-relevant data (for example, logs and network flows) from across silos, using integrated and intelligent security analytics to better predict and detect risks to the business ●● ● Helping reduce operational risk from threats facing structured (databases) and unstructured (documents) data to help prevent data loss and unauthorized access Highlighted Specific Offerings ●● ● IBM Security QRadar: Integrated, automated security intel- ligence and analytics for the entire enterprise ●● ● IBM InfoSphere Guardium: Real-time database security and monitoring, fine-grained database auditing, automated compliance reporting Advanced Threats Organizations face increasing complexity in defending them- selves from skilled and determined adversaries. These attackers can target critical IT assets and public infrastructure using both sophisticated and off-the-shelf techniques to gain access. The challenge: no one solution is enough. Organizations must go beyond traditional patch-monitor-remediate processes and employ both continuous monitoring and layers of defense capa- ble of working in concert with one another to identify, analyze and respond to targeted threats. IBM helps protect against advanced threats by: ●● ● Helping identify and defend against known and unknown attacks by combining network security, worldwide threat intel- ligence and advanced security analytics Highlighted Specific Offering ●● ● IBM Advanced Threat Protection Platform: Including IBM Security Network Intrusion Prevention System, IBM Security SiteProtector System, IBM Security QRadar Network Anomaly Detection and IBM Security X-Force Threat Insight – Injects X-Force intelligence into QRadar to help identify threats associated with malicious IP addresses – Helps protect against network-based threats masked in common network traffic and helps prevent attackers from exploiting vulnerabilities at the network, host and applica- tion layers Gartner rates IBM Security in the Leaders Quadrant Magic Quadrant for Static Application Security Testing, by Joseph Feiman, Neil MacDonald, December 12, 2010 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms, by French Caldwell, John Wheeler, October 4, 2012 Magic Quadrant for Dynamic Application Security Testing, by Joseph Feiman, Neil MacDonald, December 17, 2011 Magic Quadrant for User Administration/Provisioning, by Earl Perkins, Perry Carpenter, December 22, 2011 Magic Quadrant for Security Information & Event Management, by Mark Nicolett, Kelly Kavanagh, May 24, 2012
  • 12. Please Recycle Conclusion In a world of big data, where information is the lifeblood of business and persistent attacks on enterprise data and IT assets have eroded the effectiveness of traditional IT defenses, a funda- mentally new approach to security is needed. Such an approach must be based on three main tenets—Intelligence, Integration and Expertise—delivering the infrastructure visibility, cross- organizational linkages and optimized controls necessary not only to help protect business-critical data but also to support compliance activities. The IBM Security Framework delivers a unified approach to enterprise security that manages key func- tions ranging from threat detection to user access, compliance cost reduction and configuration management—and much more—all with a foundation in world-renowned research and development to help reduce the risk of today’s advanced threats. For more information To learn more about IBM Security, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/security To join the Institute for Advanced Security, please visit: www.instituteforadvancedsecurity.com Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing © Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America February 2013 IBM, the IBM logo, ibm.com, Tivoli, WebSphere, AppScan, Guardium, InfoSphere, RACF, and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. WGB03004-USEN-00